• Title/Summary/Keyword: Security Camera

Search Result 296, Processing Time 0.025 seconds

Multiple Object Tracking and Identification System Using CCTV and RFID (감시 카메라와 RFID를 활용한 다수 객체 추적 및 식별 시스템)

  • Kim, Jin-Ah;Moon, Nammee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.51-58
    • /
    • 2017
  • Because of safety and security, Surveillance camera market is growing. Accordingly, Study on video recognition and tracking is also actively in progress, but There is a limit to identify object by obtaining the information of object identified and tracked. Especially, It is more difficult to identify multiple objects in open space like shopping mall, airport and others utilized surveillance camera. Therefore, This paper proposed adding object identification function by using RFID to existing video-based object recognition and tracking system. Also, We tried to complement each other to solve the problem of video and RFID based. Thus, through the interaction of system modules We propose a solution to the problems of failing video-based object recognize and tracking and the problems that could be cased by the recognition error of RFID. The system designed to identify the object by classifying the identification of object in four steps so that the data reliability of the identified object can be maintained. To judge the efficiency of this system, this demonstrated by implementing the simulation program.

A study on Prevent fingerprints Collection in High resolution Image (고해상도로 찍은 이미지에서의 손가락 지문 채취 방지에 관한 연구)

  • Yoon, Won-Seok;Kim, Sang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.6
    • /
    • pp.19-27
    • /
    • 2020
  • In this study, Developing high resolution camera and Social Network Service sharing image can be easily getting images, it cause about taking fingerprints to easy from images. So I present solution about prevent to taking fingerprints. this technology is develop python using to opencv, blur libraries. First of all 'Hand Key point Detection' algorithm is used to locate the hand in the image. Using this algorithm can be find finger joints that can be protected while minimizing damage in the original image by using the coordinates of separate blurring the area of fingerprints in the image. from now on the development of accurate finger tracking algorithms, fingerprints will be protected by using technology as an internal option for smartphone camera apps from high resolution images.

Intelligent Mobile Surveillance System Based on Wireless Communication (무선통신에 기반한 지능형 이동 감시 시스템 개발)

  • Jang, Jae-Hyuk;Sim, Gab-Sig
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.11-20
    • /
    • 2015
  • In this paper, we develop an intelligent mobile surveillance system based on binary CDMA for the unmanned automatic tracking and surveillance. That is, we implement a intelligent surveillance system using the binary CDMA wireless communication technology which is applied the merit of CDMA and TDMA on it complexly. This system is able to monitor the site of the accident on network in real time and process the various situations by implementing the security surveillance system. This system pursues an object by the 360-degree using camera, expands image using a PTZ(Pan/Tilt/Zoom) camera zooming function, identifies the mobile objects image within a screen and transfers the identified image to the remote site. Finally, we show the efficiency of the implemented system through the simulation of the controlled situations, such as tracking coverage on objects, object expansion, object detection number, monitoring the remote transferred image, number of frame per second by the image output signal etc..

Fusion algorithm for Integrated Face and Gait Identification (얼굴과 발걸음을 결합한 인식)

  • Nizami, Imran Fareed;An, Sung-Je;Hong, Sung-Jun;Lee, Hee-Sung;Kim, Eun-Tai;Park, Mig-Non
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.72-77
    • /
    • 2008
  • Identification of humans from multiple view points is an important task for surveillance and security purposes. For optimal performance the system should use the maximum information available from sensors. Multimodal biometric systems are capable of utilizing more than one physiological or behavioral characteristic for enrollment, verification, or identification. Since gait alone is not yet established as a very distinctive feature, this paper presents an approach to fuse face and gait for identification. In this paper we will use the single camera case i.e both the face and gait recognition is done using the same set of images captured by a single camera. The aim of this paper is to improve the performance of the system by utilizing the maximum amount of information available in the images. Fusion in considered at decision level. The proposed algorithm is tested on the NLPR database.

Study on Remote Face Recognition System Using by Multi Thread on Distributed Processing Server (분산처리서버에서의 멀티 쓰레드 방식을 적용한 원격얼굴인식 시스템)

  • Kim, Eui-Sun;Ko, Il-Ju
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.5
    • /
    • pp.19-28
    • /
    • 2017
  • Various methods for reducing the load on the server have been implemented in performing face recognition remotely by the spread of IP security cameras. In this paper, IP surveillance cameras at remote sites are input through a DSP board equipped with face detection function, and then face detection is performed. Then, the facial region image is transmitted to the server, and the face recognition processing is performed through face recognition distributed processing. As a result, the overall server system load and significantly reduce processing and real-time face recognition has the advantage that you can perform while linked up to 256 cameras. The technology that can accomplish this is to perform 64-channel face recognition per server using distributed processing server technology and to process face search results through 250 camera channels when operating four distributed processing servers there was.

Development of Passive Millimeter-wave Security Screening System (수동 밀리미터파 보안 검색 시스템 개발)

  • Yoon, Jin-Seob;Jung, Kyung Kwon;Chae, Yeon-Sik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.7
    • /
    • pp.138-143
    • /
    • 2016
  • The designed and fabricated millimeter-wave security screening system receives radiation energy from an object and a human body. The imaging system consist of sixteen array antennas, sixteen four-stage LNAs, sixteen detectors, an infrared camera, a CCD camera, reflector, and a focusing lens. This system requires high sensitivity and wide bandwidth to detect the input thermal noise. The LNA module of the system has been measured to have 65.8 dB in average linear gain and 82 GHz~102 GHz in bandwidth to enhance the sensitivity for thermal noise, and to receive it over a wide bandwidth. The detector is used for direct current (DC) output translation of millimeter-wave signals with a zero bias Schottky diode. The lens and front-end of the millimeter-wave sensor are important in the system to detect the input thermal noise signal. The frequency range in the receiving sensitivity of the detectors was 350 to 400 mV/mW at 0 dBm (1 mW) input power. The developed W-band imaging system is effective for detecting and identifying concealed objects such as metal or plastic.

Smart IoT Service Users' Compliance with Personal Information Protection Behavior: An Empirical Study on the Message Design Features to Induce Installation of Software Updates (스마트 IoT 서비스 사용자의 개인정보 보호 행동 준수: 소프트웨어 업데이트 유도를 위한 메세지 디자인 특성에 관한 실증 연구)

  • Lee, Ho-Jin;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.82-104
    • /
    • 2024
  • Smart home services are growing rapidly as the development of the Internet of Things (IoT) opens the era of the so-called "Connected Living." Although personal information leaks through smart home cameras are increasing, however, users-while concerned-tend to take passive measures to protect their personal information. This study theoretically explained and verified how to design effective software update notification messages for smart home cameras to ensure that users comply with the recommended security behavior (i.e., update installation). In a survey experiment participated in by 120 actual users, the effectiveness of both emotional appeals (i.e., security breach warning images for fear appeals) and rational appeals (i.e., loss-framed messages emphasizing the negative consequences of not installing the updates) were confirmed. The results of this study provide theoretical interpretations and practical guidelines on the message design features that are effective for threat appraisals (i.e., severity, vulnerability) of smart home camera users and their protection motivation.

A Study on the Improvement of Aquaculture Security System to Insure the Lawful Evidence of Theft (도적행위의 법적증거확보를 위한 양식장 보안 시스템 개선에 관한 연구)

  • Yim, Jeong-Bin;Nam, Taek-Keun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.4
    • /
    • pp.55-63
    • /
    • 2007
  • The Group Digital Surveillance System for Fishery Safety and Security (GDSS-F2S) is to provide the target tracking information and the target identification information in order to secure an huge aquaculture farm-field from a thief. The two information, however, is not enough to indict the thief due to the lack of lawful evidences for the crime actions. To overcome this problem, we consider the target image information as one of solutions after discussion with the effective countermeasure tools for the crime actions with scenario-based analysis according to the geological feature of aquaculture farm-field. To capture the real-time image for the trespassing targets in the aquaculture farm-field area, we developed the image capture system which is consists of ultra sensitive CCD(Charge-Coupled Device) camera with 0.0001 Lux and supplementary devices. As results from the field tests for GDSS-F2S with image capture system, the high definite images of the vehicle number plate and shape, person's actions and features are obtainable not only day time but also very dark night without moon light. Thus it is cleary known that the improved GDSS-F2S with image capture system can provide much enough lawful evidences for the crime actions of targets.

  • PDF

Development of the Practical System for the Automated Damage Assessment (재해 피해조사 자동화를 위한 실용시스템 구축)

  • Jin, Kyeonghyeok;Kim, Youngbok;Choi, Woojung;Shim, Jaehyun
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.2
    • /
    • pp.73-78
    • /
    • 2008
  • Recently, large scale natural disasters such as floods and typhoons due to climate change have been occurring all over the world causing severe damages. Among the various efforts to reduce and recover damages, recently, advanced information technology and remote sensing techniques are applied in disaster management. In this study, a real-time automated damage estimation system using information technology and spatial imagery was developed to accomplish prompt and accurate disaster damage estimation. This system is able to estimate the damage amounts of public facilities such as roads, rivers, bridges automatically through spatial imageries including ground based digital images, aerial photos, satellite images of disaster sites. Based on these spatial imageries, the damage amounts are analyzed in the Web-GIS based analysis system. Consequently, the digital damage reports such as digital disaster information sheets and damage maps can be made promptly and accurately. This system can be a useful tool to carry out prompt disaster damage estimation and efficient disaster recovery.

  • PDF

Real-time Object Tracking using Adaptive Background Image in Video (동영상에서 적응적 배경영상을 이용한 실시간 객체 추적)

  • 최내원;지정규
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.409-418
    • /
    • 2003
  • Object tracking in video is one of subject that computer vision and several practical application field have interest in several years. This paper proposes real time object tracking and face region extraction method that can be applied to security and supervisory system field. For this, in limited environment that camera is fixed and there is seldom change of background image, proposed method detects position of object and traces motion using difference between input image and background image. The system creates adaptive background image and extracts pixels in object using line scan method for more stable object extraction. The real time object tracking is possible through establishment of MBR(Minimum Bounding Rectangle) using extracted pixels. Also, effectiveness for security and supervisory system is improved due to extract face region in established MBR. And through an experiment, the system shows fast real time object tracking under limited environment.

  • PDF