• Title/Summary/Keyword: Security Target

Search Result 697, Processing Time 0.306 seconds

A Study on Implementation of an Intelligent Video Surveillance System for Effective Education Method of Image Processing (효율적인 영상 처리 교육방법을 위한 지능형 영상 감시 시스템 구현에 관한 연구)

  • Park, Ho-Sik
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.1
    • /
    • pp.84-88
    • /
    • 2010
  • Recently, it is essential to have the system which can track down and identity the random object in the space in which security is a high priority. Due to the fact that we mentioned above, in this paper. We suggest the intelligent video surveillance system effective image-process-education in this paper. The experiment was conducted to check and track down the entering vehicle. And, Pan-Tilt-Zoom camera was used to obtain the enlarged image of the object while a vehicle was making stop in target area. As a result, the experiment has shown the data as following. When the object is in motion, success rate is 97.4%, while success rate is 91% when the object is motionless. By using the suggested system, effective image-process-education is should be achieved because the students who participate in the class can have simultaneous access to the system for real time image data and camera control.

  • PDF

Product development for Digital Video Recorder Design Analysis (영상저장장치(DVR)디자인 개발을 위한 제품 분석)

  • Choi, Jong-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.135-145
    • /
    • 2012
  • This study is a research development case study on the free-standing Network based camera video recording DVR. The DVR devices till now have recorded data by converting and compressing analogue video to digital, but in the future, digital videos will be recorded directly through the network camera. Also, digital compressing methods are progressing from MPEG-4, MJPEG, to H.264 method, with products considering high definition compression efficiency, minimized data size, network compatibility, and fast pending time. According to this, in 2012, it is predicted that network camera and video devices throughout the world will outrun the current analogue devices. With this transition of technological environment and fast product pending speed, a new, quality focused design is required for product development including technical realization, reliability, high-definition, compression technology, will be essential. Manufacturers are researching a new direction for the product appearance. This study considers the actual end-users as the design target and through consumer survey on preferences, design needs and required elements necessary in the design development process are extracted. Furthermore, usability and preferred images were explored through literature study and market research. Through this research process, appropriate forms for the network based DVR were analyzed, and applied into the design development process. This product will take into consideration its competitiveness and the significance of USP(Unique Selling Proposition) which is the design supremacy and professional technical skills.

Image Reconstruction Using Poisson Model Screened from Image Gradient (이미지 기울기에서 선별된 포아송 모델을 이용한 이미지 재구성)

  • Kim, Yong-Gil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.2
    • /
    • pp.117-123
    • /
    • 2018
  • In this study, we suggest a fast image reconstruction scheme using Poisson equation from image gradient domain. In this approach, using the Poisson equation, a guided vector field is created by employing source and target images within a selected region at the first step. Next, the guided vector is used in generating the result image. We analyze the problem of reconstructing a two-dimensional function that approximates a set of desired gradients and a data term. The joined data and gradients are able to work like modifying the image gradients while staying close to the original image. Starting with this formulation, we have a screened Poisson equation known in physics. This equation leads to an efficient solution to the problem in FFT domain. It represents the spatial filters that solve the two-dimensional screened Poisson model and shows gradient scaling to be a well-defined sharpen filter that generalizes Laplace sharpening. We demonstrate the results using a discrete cosine transformation based this Poisson model.

Implementation of Verification and Evaluation Testbed of WiMax2 PKMv2 Encryption Layer (WiMax2 PKMv2 암호화 계층의 검증 및 성능 평가 테스트베드의 구축)

  • Kim, Jang-Hyun;Suh, Hyo-Joong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.77-82
    • /
    • 2013
  • PKMv2 security protocol was adopted by the WiMax2 mobile internet communication standard. A base station and a mobile station protect communication data using key based encryption according to the PKMv2 protocol. Consequently, each development of a base station and/or mobile station includes implement of the PKMv2 protocol, and the station must qualifies various interoperable tests. Furthermore, communication bandwidth of the station can be limited by the encryption module when the station implemented based on a low-performance processor. Thus, a correspondence measurement of the encryption module must be carried on the target processor. In this paper, we implement a testbed which affords throughput measurement as well as the interoperable tests by PKMv2.

Analysis of the Electromagnetic Leakage from Liquid Crystal Display Monitors (LCD 모니터의 누설 전자파에 대한 분석)

  • Lee, Ho seong;Sim, Kyuhong;Oh, Seungsub;Yook, Jong-Gwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.9
    • /
    • pp.844-853
    • /
    • 2016
  • Generally, the compromising electromagnetic emanations are generated from LCD(Liquid Crystal Display) monitor which is typical output component of computer. Because display information transmitted to LCD monitor is included in these emanations, there are risks about information leakage of monitor by eavesdropping of leaked signal. So, analysis about possibility of information leakage is necessary because electromagnetic security through the electromagnetic emanations is being at issue. In this paper, the possibility of display information leakage are demonstrated by analyzing the electromagnetic emanations from desktop and laptop monitors. The characteristics of leaked signal from LCD monitor is verified by analyzing display mechanism and the electromagnetic emanations are measured in the long distance by eavesdropping experiment. Also, threat of information leakage is confirmed by recovering display information with several signal processing technique and comprising with target display.

A Study on the U-City Information Characterization for the Effective Information Management (효율적 정보관리를 위한 U-City 정보 특성분석에 관한 연구)

  • Ahn, Jong-Wook;Shin, Dong-Bin;Kim, Jung-Hoon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.1
    • /
    • pp.119-127
    • /
    • 2010
  • In this study, U-City to effectively manage information as a basis for studies of U-City Info characteristics were analyzed. U-City services are currently being discussed which is about 228. Short-term possibility of applying these services, the service's practicality and availability of services based on public services analyzed, 39 were selected. Next, the selected U-City to target services to analyze the flow of information and analysis based on the characteristics of U-City information was derived. U-City information derived from this study, the characteristics of real-time information, and service-specific mandatory and optional information, melting complex information, dynamic information, large amounts of data, user-customized information, and information security vulnerabilities, revealing personal information and privacy is. The results of this study, governments and municipalities to promote the construction of the U-City can be used effectively. To do so, considering the characteristics of U-City information, information management standards should be established.

Assessment of Inundation Rainfall Using Past Inundation Records and CCTV Images (CCTV영상과 과거침수기록을 활용한 침수 강우량 평가 - 강남역을 중심으로 -)

  • Kim, Min Seok;Lee, Mi Ran;Choi, Woo Jung;Lee, Jong Kook
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.6_1
    • /
    • pp.567-574
    • /
    • 2012
  • For the past few years, the video surveillance market has shown a rapid growth due to the increasing demand for Closed Circuit Television(CCTV) by the public sector and the private security industry. While the overall utilization of CCTV in the public and private sectors is expanding, its usage in the field of disaster management is less than sufficient. Therefore, the authors of this study, in an effort to revisit the role of CCTV in disaster situations, have carried out a case analysis in the vicinity of the Gangnam Station which has been designated as a natural disaster-prone area. First, the CCTV images around the target location are collected and the time and depth of inundation are measured through field surveys and image analyses. Next, a rainfall analysis was conducted using the Automatic Weather Station(AWS) data and the past inundation records. Lastly, the authors provide an estimate of rainfall for the areas around the station and suggest viable warning systems and countermeasures. The results from this study are expected to make positive contributions towards a significant reduction of the damages caused by the floods around the Gangnam Station.

Breeding Strategies to Increase Production Potential of Major Food Crops in Korea (식량생산능력 향상을 위한 농작물 육종전략)

  • Kim Gwang Ho;Kim Seok Dong;Park Mun Ung;Mun Heon Pal
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 1999.11a
    • /
    • pp.80-101
    • /
    • 1999
  • Self-sufficiency ratio of food crops in Korea is estimated under $20{\%}$ in 2010 because total food consumption including feed will be increased. but food grain production will be decreased. It is necessary to maintain the optimum level of food self-sufficiency rate to secure national food demand/supply balance and non-trade and multiple function of agriculture in Korea. It will be possible to produce more food grains having the acceptable quality if the appropriate policy and cropping techniques are developed and practised in future. Breeding for high yielding varieties should be the first target to raise the production potential of food crops . Number of varieties developed during last 30 years is counted as 353 in food crops. New varieties developed in 1990s showed the higher yield potential and the improved agronomic characteristics compared with 1970s and 1980s varieties. But number of varieties planted on the farmer's field over $5{\%}$ of national planting area is less than one third of total varieties developed Breeding efforts to maintain planting area of main food crops should be focussed on consumer's demand and farmer's need. They are the best quality variety in each field of crop utilization, the newly designed variety adapting to changes of natural, rural and cropping environment, and the higher yielding variety. It is also needed to develop new quality crop varieties for inducing more consumption of crop grain produced in Korea for direct food or processing. Development of barley varieties for animal feed. high income soybean varieties, high quality wheat variety. and super yielding rice and barley varieties are also needed to keep or maximize national food production potential. In order to establish the appropriate cropping technique for domestic food security, the strong and continuous interest and financial support on crop breeding are required, and the inter-disciplinary and inter-institutionary researches should be strengthened for successful crop breeding.

  • PDF

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF

Offline Object Tracking for Private Information Masking in CCTV Data (CCTV 개인영상 정보보호를 위한 오프라인 객체추적)

  • Lee, Suk-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2961-2967
    • /
    • 2014
  • Nowadays, a private protection act has come into effect which demands for the protection of personal image information obtained by the CCTV. According to this act, the object out of interest has to be mosaicked such that it can not be identified before the image is sent to the investigation office. Meanwhile, the demand for digital videos obtained by CCTV is also increasing for digital forensic. Therefore, due to the two conflicting demands, the demand for a solution which can automatically mask an object in the CCTV video is increasing and related IT industry is expected to grow. The core technology in developing a target masking solution is the object tracking technique. In this paper, we propose an object tracking technique which suits for the application of CCTV video object masking as a postprocess. The proposed method simultaneously uses the motion and the color information to produce a stable tracking result. Furthermore, the proposed method is based on the centroid shifting method, which is a fast color based tracking method, and thus the overall tracking becomes fast.