• Title/Summary/Keyword: Surveillance systems

Search Result 744, Processing Time 0.028 seconds

Technical and Managerial Requirements for Privacy Protection Using Face Detection and Recognition in CCTV Systems (영상감시 시스템에서의 얼굴 영상 정보보호를 위한 기술적·관리적 요구사항)

  • Shin, Yong-Nyuo;Chun, Myung Geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.97-106
    • /
    • 2014
  • CCTV(Closed Circuit television) is one of the widely used physical security technologies and video acquisition device installed at specific point with various purposes. Recently, as the CCTV capabilities improve, facial recognition from the information collected from CCTV video is under development. However, in case these technologies are exploited, concerns on major privacy infringement are high. Especially, a computer connected to a particular space images taken by the camera in real time over the Internet has emerged to show information services. In the privacy law, safety measures which is related with biometric template are notified. Accordingly, in this paper, for the protection of privacy video information in the video surveillance system, the technical and managerial requirements for video information security are suggested.

A Node Scheduling Control Scheme with Time Delay Requirement in Wireless Sensor Actuator Networks (무선 센서 엑츄에이터 네트워크에서의 시간지연을 고려한 노드 스케줄링 제어 기법)

  • Byun, Heejung
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.17-23
    • /
    • 2016
  • Wireless sensor-actuator networks (WSANs) enhance the existing wireless sensor networks (WSNs) by equipping sensor nodes with an actuator. The actuators work with the sensor nodes and perform application-specific operations. The WSAN systems have several applications such as disaster relief, intelligent building, military surveillance, health monitoring, and infrastructure security. These applications require capability of reliable data transfer to act responsively and accurately. Biologically inspired modeling techniques have received considerable attention for achieving robustness, scalability, and adaptability, while retaining individual simplicity. In this paper, an epidemic-inspired algorithm for data dissemination with delay constraints while minimizing energy consumption in WSAN is proposed. The steady states and system stability are analyzed using control theory. Also, simulation results indicate that the proposed scheme provides desirable dissemination delay and energy saving.

A Fast Motion Detection and Tracking Algorithm for Automatic Control of an Object Tracking Camera (객체 추적 카메라 제어를 위한 고속의 움직임 검출 및 추적 알고리즘)

  • 강동구;나종범
    • Journal of Broadcast Engineering
    • /
    • v.7 no.2
    • /
    • pp.181-191
    • /
    • 2002
  • Video based surveillance systems based on an active camera require a fast algorithm for real time detection and tracking of local motion in the presence of global motion. This paper presents a new fast and efficient motion detection and tracking algorithm using the displaced frame difference (DFD). In the Proposed algorithm, first, a Previous frame is adaptively selected according to the magnitude of object motion, and the global motion is estimated by using only a few confident matching blocks for a fast and accurate result. Then, a DFD is obtained between the current frame and the selected previous frame displaced by the global motion. Finally, a moving object is extracted from the noisy DFD by utilizing the correlation between the DFD and current frame. We implement this algorithm into an active camera system including a pan-tilt unit and a standard PC equipped with an AMD 800MHz processor. The system can perform the exhaustive search for a search range of 120, and achieve the processing speed of about 50 frames/sec for video sequences of 320$\times$240. Thereby, it provides satisfactory tracking results.

Location Optimization in Heterogeneous Sensor Network Configuration for Security Monitoring (보안 모니터링을 위한 이종 센서 네트워크 구성에서 입지 최적화 접근)

  • Kim, Kam-Young
    • Journal of the Korean Geographical Society
    • /
    • v.43 no.2
    • /
    • pp.220-234
    • /
    • 2008
  • In many security monitoring contexts, the performance or efficiency of surveillance sensors/networks based on a single sensor type may be limited by environmental conditions, like illumination change. It is well known that different modes of sensors can be complementary, compensating for failures or limitations of individual sensor types. From a location analysis and modeling perspective, a challenge is how to locate different modes of sensors to support security monitoring. A coverage-based optimization model is proposed as a way to simultaneously site k different sensor types. This model considers common coverage among different sensor types as well as overlapping coverage for individual sensor types. The developed model is used to site sensors in an urban area. Computational results show that common and overlapping coverage can be modeled simultaneously, and a rich set of solutions exists reflecting the tradeoff between common and overlapping coverage.

A study on the implementation of the wireless video security system (무선 영상보안시스템 구현에 관한 연구)

  • Kim, Young-Min;Kim, Myeong-Hwan;Kim, Sun-Hyung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.1
    • /
    • pp.99-104
    • /
    • 2012
  • In this paper, implementation of a wireless video security system relates to a situation outside of using infrared sensors to detect changes when using Zigbee network security in the area of the sensor sends information to the server. The server can judge the situation if an emergency situation through the IP network security camera shot of the area to be transferred command to pantilte. The camera images and information in the security area, sent to administrator's smartphone users to control the camera can see the situation and More than a small video security system was designed so that user can monitor the security zone. Finally, for real-time to identify and respond to emergency situations based on the available wireless networks for video surveillance systems were verified through research and implementation.

  • PDF

Development of Mission Analysis and Design Tool for ISR UAV Mission Planning (UAV 감시정보정찰 임무분석 및 설계 도구 개발)

  • Kim, Hongrae;Jeon, Byung-Il;Lee, Narae;Choi, Seong-Dong;Chang, Young-Keun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.2
    • /
    • pp.181-190
    • /
    • 2014
  • The optimized flight path planning which is appropriate for UAV operation with high performance and multiplex sensors is required for efficient ISR missions. Furthermore, a mission visualization tool is necessary for the assessment of MoE(Measures of Effectiveness) prior to mission operation and the urgent tactical decision in peace time and wartime. A mission visualization and analysis tool was developed by combining STK and MATLAB, whose tool was used for UAV ISR mission analyses in this study. In this mission analysis tool, obstacle avoidance and FoM(Figure of Merit) analysis algorithms were applied to enable the optimized mission planning.

A Study on the Improvement of Military Information Communication Network Efficiency Using CCN (CCN을 활용한 군 정보통신망 효율성 향상 방안)

  • Kim, Hui-Jung;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.799-806
    • /
    • 2020
  • The rapid growth of smartphone-to-Internet of Things (IoT) connections and the explosive demand for data usage centered on mobile video are increasing day by day, and this increase in data usage creates many problems in the IP system. In a full-based environment, in which information requesters focus on information providers to receive information from specific servers, problems arise with bottlenecks and large data processing. To address this problem, CCN networking technology, a future network technology, has emerged as an alternative to CCN networking technology, which reduces bottlenecks that occur when requesting popular content through caching of intermediate nodes and increases network efficiency, and can be applied to military information and communication networks to address the problem of traffic concentration and the use of various surveillance equipment in full-based networks, such as scientific monitoring systems, and to provide more efficient content.

The Fault Tolerant Evaluation Model due to the Periodic Automatic Fault Detection Function of the Safety-critical I&C Systems in the Nuclear Power Plants (원전 안전필수 계측제어시스템의 주기적 자동고장검출기능에 따른 고장허용 평가모델)

  • Hur, Seop;Kim, Dong-Hoon;Choi, Jong-Gyun;Kim, Chang-Hwoi;Lee, Dong-Young
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.7
    • /
    • pp.994-1002
    • /
    • 2013
  • This study suggests a generalized availability and safety evaluation model to evaluate the influences to the system's fault tolerant capabilities depending on automatic fault detection function such as the automatic periodic testings. The conventional evaluation model of automatic fault detection function deals only with the self diagnostics, and supposes that the fault detection coverage of self diagnostics is always constant. But all of the fault detection methods could be degraded. For example, the periodic surveillance test has the potential human errors or test equipment errors, the self diagnostics has the potential degradation of built-in logics, and the automatic periodic testing has the potential degradation of automatic test facilities. The suggested evaluation models have incorporated the loss or erroneous behaviors of the automatic fault detection methods. The availability and the safety of each module of the safety grade platform have been evaluated as they were applied the automatic periodic test methodology and the fault tolerant evaluation models. The availability and safety of the safety grade platform were improved when applied the automatic periodic testing. Especially the fault tolerant capability of the processor module with a weak self-diagnostics and the process parameter input modules were dramatically improved compared to the conventional cases. In addition, as a result of the safety evaluation of the digital reactor protection system, the system safety of the digital parts was improved about 4 times compared to the conventional cases.

A Study on Analysis of Phase Noise Effects in a FM-CW Radar System (FM-CW 레이다 시스템에서의 위상잡음 영향 분석에 관한 연구)

  • Lee, Jong-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1840-1846
    • /
    • 2011
  • It is necessary to estimate the Doppler spectrum for each range cell for the extraction of useful information from the return echoes in radar systems used for the remote sensing purpose such as detection of moving targets and weather surveillance. The signal amplitude in the beat frequency band is the important parameter in the detection and tracking of targets. However, strong clutter echoes do exist in most radar operation environments and the system phase noise spreads both the clutter and signal echoes of the target. In this paper, the effects of this system phase noise are analyzed concerning the clutter and the signal beat spectrum. It is shown that the separation capability of adjacent beat signal depends on the degree of spread in the clutter and beat signal caused by the radar system phase noise

Individual Pig Detection Using Kinect Depth Information (키넥트 깊이 정보를 이용한 개별 돼지의 탐지)

  • Choi, Jangmin;Lee, Jonguk;Chung, Yongwha;Park, Daihee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.319-326
    • /
    • 2016
  • Abnormal situation caused by aggressive behavior of pigs adversely affects the growth of pigs, and comes with an economic loss in intensive pigsties. Therefore, IT-based video surveillance system is needed to monitor the abnormal situations in pigsty continuously in order to minimize the economic demage. In this paper, we propose a new Kinect camera-based monitoring system for the detection of the individual pigs. The proposed system is characterized as follows. 1) The background subtraction method and depth-threshold are used to detect only standing-pigs in the Kinect-depth image. 2) The moving-pigs are labeled as regions of interest. 3) A contour method is proposed and applied to solve the touching-pigs problem in the Kinect-depth image. The experimental results with the depth videos obtained from a pig farm located in Sejong illustrate the efficiency of the proposed method.