• Title/Summary/Keyword: Visual Security

Search Result 248, Processing Time 0.028 seconds

A Study on Aesthetic Features of Municipal Police Uniform -Focused in France, Italy, Spain and Korea- (자치경찰제복에 나타난 조형적 특성에 관한 연구 -프랑스, 이탈리아, 스페인, 한국을 중심으로-)

  • Ahn, Byeol;Lee, Youngjae
    • Journal of Fashion Business
    • /
    • v.24 no.2
    • /
    • pp.17-31
    • /
    • 2020
  • The concept of municipal police is in contrast to the national police, which is in charge of the overall people. With increased localization, the need for a municipal police system is emphasized in each region. This study is intended to analyze the role of municipal police uniform considering the change in security from the national to the local level based on the introduction of municipal police system. The study investigators developed the concept of centralized national police system and decentralized self-governing municipal police system based on a literature review and Internet research. The investigators analyzed the design of municipal police uniform by reviewing the systems in several other countries. The results revealed specific formative features of municipal police uniform such as representative ambivalence, expression of visual language, manifest visibility, and reflection of regional characteristics. The municipal police uniform is adapted to changes in local government requiring a shift of awareness on to municipal police compared with the existing national police. The creation of a municipal police uniform enhances the efficiency of work by projecting a resident-friendly image, social support and cooperation, which play a huge role in illustrating the exemplary service to promote a stable and peaceful society locally.

Time Stamp Compression in RTP Protocols using Enhanced Negotiation Bits Decision Algorithm (RTP 프로토콜에서 Time Stamp필드의 압축을 위한 향상된 협상비트 결정 알고리즘)

  • Kim, Kyung-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.55-61
    • /
    • 2013
  • The important issue in header compression would be how to compress the dynamic field increasing constantly between consecutive packets in the head of IP wireless networks. Existent header compression scheme that can eliminated repeated field in header are RFC2507, RFC3095 and E-ROHC scheme. In this paper, I propose a new method of compressing TS fields, which are the Dynamic fields of the RTP packet, into BCB (Basic Compression Bits) basic bits or NCB (Negotiation Compression Bits, BCB + additional bits) bits. In order to verify the proposed header compression method, I have simulation about proposed video packets of IP wireless networks. using Visual SLAM.

A Study on Software Education Donation Model for the Social Care Class

  • Lee, Won Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.239-246
    • /
    • 2019
  • In this paper, we propose an effective software education donation model for the social care class. The types of software education for elementary, middle, and high school for the social care class are in the order of after school classes, club activities, creative experiences, and regular classes. In elementary school students, it is effective to precede visual programming education based on block coding and to conduct curriculum convergence with SW and HW at the beginning, and high school students are carrying out text programming education like Python. Software education for social care class The contribution activity model can be classified into five types such as geographically difficult area, multicultural family areas, orphanage, reformatory, and basic livelihood security recipient. In addition, the survey results show that the students' interest in software education and their satisfaction are all very high at 96%. Effective software education for the social care class In the donation model, the lecturers consist of responsible professors, lecturers, and assistant instructors. Software training for the social care class is effective on a year-by-year basis, so that students can feel authenticity and trust. Software education contents focus on visual programming and physical computing education in elementary or middle school, and text programming and physical computing education in high school. It is necessary to construct a software education donor matching system that helps efficient management of software education donations by efficiently matching schools (consumers: elementary, middle, high school) and software education donors(suppliers).

Shifted Histogram Matching Algorithm for Image Retrieval (영상 검색을 위한 Shifted 히스토그램 정합 알고리즘)

  • Yoo, Gi-Hyoung;Yoo, Seung-Sun;Youk, Sang-Jo;Park, Gil-Cheol
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.107-113
    • /
    • 2007
  • This paper proposes the shifted histogram method (SHM), for histogram-based image retrieval based on the dominant colors in images. The histogram-based method is very suitable for color image retrieval because retrievals are unaffected by geometrical changes in images, such as translation and rotation. Images with the same visual information, but with shifted color intensity, may significantly degrade if the conventional histogram intersection method (HIM) is used. To solve this problem, we use the shifted histogram method (SHM). Our experimental results show that the shifted histogram method has significant higher retrieval performance than the standard histogram method.

  • PDF

An Effective Implementation Method for Dual Use of Web-based Multidimensional Interactive Digital Contents (웹기반 다차원 민군겸용 인터액티브 디지털 콘텐츠의 효과적인 구현 방안)

  • Gang, Seok-Hun;Kim, Dae-Cheong
    • Journal of National Security and Military Science
    • /
    • s.3
    • /
    • pp.197-242
    • /
    • 2005
  • Active catalog is a kind of digital content that enables consumers to test the functions and features of products from their PCs as if they were using it in real life, by simulating the actions and responses of the product. This new type of interactive digital content can be used extensively to make sales personnel training manuals, sales tools, user manuals and user trouble shooting documents. With active catalogs, companies will be able to compare different designs, show actions according to different functions, and evaluate user reaction to new products without having to produce a single physical prototype or mock-up. At the same time, consumers will be able to understand and 'operate' the product and make well-informed purchase decisions. In this paper, we present a visual event-driven modeling tool, PlayMo, for creating active catalogs, analyze the advantages of using PlayMo, describe the event-driven method used by PlayMo and also introduce two enhanced characteristics of the Event Flow Chart with which the events in PlayMo are structured. Interactive digital content by using the PlayMo3D makes easy, simple and effective design for e-learning, e-catalogue, e-marketing/sales, e-prototyping, customer support, etc. Through its application-ready 3D function visualization solution, engineers and designers can rapidly turn a CAD design model into a 3D interactive virtual product, and the effective function prototyping job can be also completed within a minute.

  • PDF

A case study on the building of integrated CCTV control center at Busan metropolitan city (부산광역시 CCTV통합관제센터구축 사례연구)

  • Kwon, Chang-Hwan;Seo, Chang-Gab
    • Journal of Digital Convergence
    • /
    • v.9 no.3
    • /
    • pp.191-202
    • /
    • 2011
  • Public agencies and local governments have been installing CCTV cameras for the prevention of crime, traffic jam, and unauthorized waste. Additionally, national government agencies and schools, a special corporation by special law, local construction and industrial company installed CCTV cameras of their own and are operating them. Various types of CCTV systems disclosed technical heterogeneity. In February, 2011, Ministry of Public Administration and Security presented guidelines for building an integrated control center. This study examines the case of Busan by using the administrative guidelines. Busan integrated CCTV control center among themselves, police agency and fire department. This study looks into the potential problems with the integration process of CCTV cameras and proposes a solution to them.

A Coherent Algorithm for Noise Revocation of Multispectral Images by Fast HD-NLM and its Method Noise Abatement

  • Hegde, Vijayalaxmi;Jagadale, Basavaraj N.;Naragund, Mukund N.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.556-564
    • /
    • 2021
  • Numerous spatial and transform-domain-based conventional denoising algorithms struggle to keep critical and minute structural features of the image, especially at high noise levels. Although neural network approaches are effective, they are not always reliable since they demand a large quantity of training data, are computationally complicated, and take a long time to construct the model. A new framework of enhanced hybrid filtering is developed for denoising color images tainted by additive white Gaussian Noise with the goal of reducing algorithmic complexity and improving performance. In the first stage of the proposed approach, the noisy image is refined using a high-dimensional non-local means filter based on Principal Component Analysis, followed by the extraction of the method noise. The wavelet transform and SURE Shrink techniques are used to further culture this method noise. The final denoised image is created by combining the results of these two steps. Experiments were carried out on a set of standard color images corrupted by Gaussian noise with multiple standard deviations. Comparative analysis of empirical outcome indicates that the proposed method outperforms leading-edge denoising strategies in terms of consistency and performance while maintaining the visual quality. This algorithm ensures homogeneous noise reduction, which is almost independent of noise variations. The power of both the spatial and transform domains is harnessed in this multi realm consolidation technique. Rather than processing individual colors, it works directly on the multispectral image. Uses minimal resources and produces superior quality output in the optimal execution time.

A New Digital Image Steganography Approach Based on The Galois Field GF(pm) Using Graph and Automata

  • Nguyen, Huy Truong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4788-4813
    • /
    • 2019
  • In this paper, we introduce concepts of optimal and near optimal secret data hiding schemes. We present a new digital image steganography approach based on the Galois field $GF(p^m)$ using graph and automata to design the data hiding scheme of the general form ($k,N,{\lfloor}{\log}_2p^{mn}{\rfloor}$) for binary, gray and palette images with the given assumptions, where k, m, n, N are positive integers and p is prime, show the sufficient conditions for the existence and prove the existence of some optimal and near optimal secret data hiding schemes. These results are derived from the concept of the maximal secret data ratio of embedded bits, the module approach and the fastest optimal parity assignment method proposed by Huy et al. in 2011 and 2013. An application of the schemes to the process of hiding a finite sequence of secret data in an image is also considered. Security analyses and experimental results confirm that our approach can create steganographic schemes which achieve high efficiency in embedding capacity, visual quality, speed as well as security, which are key properties of steganography.

Improved Feature Selection Techniques for Image Retrieval based on Metaheuristic Optimization

  • Johari, Punit Kumar;Gupta, Rajendra Kumar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.40-48
    • /
    • 2021
  • Content-Based Image Retrieval (CBIR) system plays a vital role to retrieve the relevant images as per the user perception from the huge database is a challenging task. Images are represented is to employ a combination of low-level features as per their visual content to form a feature vector. To reduce the search time of a large database while retrieving images, a novel image retrieval technique based on feature dimensionality reduction is being proposed with the exploit of metaheuristic optimization techniques based on Genetic Algorithm (GA), Extended Binary Cuckoo Search (EBCS) and Whale Optimization Algorithm (WOA). Each image in the database is indexed using a feature vector comprising of fuzzified based color histogram descriptor for color and Median binary pattern were derived in the color space from HSI for texture feature variants respectively. Finally, results are being compared in terms of Precision, Recall, F-measure, Accuracy, and error rate with benchmark classification algorithms (Linear discriminant analysis, CatBoost, Extra Trees, Random Forest, Naive Bayes, light gradient boosting, Extreme gradient boosting, k-NN, and Ridge) to validate the efficiency of the proposed approach. Finally, a ranking of the techniques using TOPSIS has been considered choosing the best feature selection technique based on different model parameters.

Image Deduplication Based on Hashing and Clustering in Cloud Storage

  • Chen, Lu;Xiang, Feng;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1448-1463
    • /
    • 2021
  • With the continuous development of cloud storage, plenty of redundant data exists in cloud storage, especially multimedia data such as images and videos. Data deduplication is a data reduction technology that significantly reduces storage requirements and increases bandwidth efficiency. To ensure data security, users typically encrypt data before uploading it. However, there is a contradiction between data encryption and deduplication. Existing deduplication methods for regular files cannot be applied to image deduplication because images need to be detected based on visual content. In this paper, we propose a secure image deduplication scheme based on hashing and clustering, which combines a novel perceptual hash algorithm based on Local Binary Pattern. In this scheme, the hash value of the image is used as the fingerprint to perform deduplication, and the image is transmitted in an encrypted form. Images are clustered to reduce the time complexity of deduplication. The proposed scheme can ensure the security of images and improve deduplication accuracy. The comparison with other image deduplication schemes demonstrates that our scheme has somewhat better performance.