• Title/Summary/Keyword: Visual Security

Search Result 248, Processing Time 0.024 seconds

Implementation of an Expert System for COTS Fault Diagnosis (COTS 고장진단을 위한 전문가 시스템 구현)

  • Kim, A-Ram;Roh, Jin-Song;Rhee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.275-281
    • /
    • 2013
  • This space is for the of your study in English. If simple menu item changes or the addition of check items are necessary on GUI menu of existing test equipments for military facilities that are programmed by using RAD tools such as Visual C++, they should go through complex steps, such as numerous conducting steps, coding, flash design modification, recompiling and distribution. It is cumbersome process and waste much time. Also, on implementing them, it was worried about leaking secrets because a number of military security considerations were included. To solve such as the above problem, we proposed commercial RIA technologies and a COTS fault diagnostic knowledge-based system that implemented by the XML data design technique in this research. The proposed approach solves the problem of existing methods, reduced inspection time, and improved performance, usability, and maintainability.

Implementation of Remote Control System using TeleRemote System (TeleRemote를 이용한 원격 제어 시스템 구현)

  • 김상복;한성호;진현준;박노경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1115-1123
    • /
    • 2003
  • In this paper, a remote control system called TeleRemote system which can be applied to existing wireless mobile networks or public telephone networks for remote control is designed and implemented. The proposed design employs program technology based on the theory of signal detect control and enables the EPG(Electronic Program Guide) functions such as recording reservation of bidirectional video signals with TV reception card on PC. It can also control recording reservation using remote control program through telecommunication network The PC-EPG system is implemented in Web programs with Server/Clinet architecture and the server system that provides EPG functionalities is in charge of recording reservations and data communications by means of the scheduler program. Data storing to client PCs is performed through TCP/IP and finished by client programs implemented using Visual C++/MFC programs. As remote control system, the developed system can be used for unmanned security system using the Web camera. Building intranet and making connection to internet, the TeleRemote system is believed to create potential for commercial communication system.

A Multi-Stage Encryption Technique to Enhance the Secrecy of Image

  • Mondal, Arindom;Alam, Kazi Md. Rokibul;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2698-2717
    • /
    • 2019
  • This paper proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secured transmission through the public network. A great number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, watermarking etc. while are applied individually, usually they cannot provide unbreakable secrecy. In this paper, through combining several separate techniques, a hybrid multi-stage encryption technique is proposed which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques.

THE INVESTIGATION OF PROPERTY MANAGEMENT AND DEVELOPMENT OF "BUILDING ADMINISTRATION SYSTEM"

  • Yan-Chyuan Shiau ;Cheng-Wei Liu ;Shu-Jen Sung;Chih-Kun Chu;Tsung-Pin Tsai
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.550-557
    • /
    • 2005
  • Because each building is built in different time, there exists different equipment to meet the need for each age. Before the announcement of "Community Management Regulation", the old communities usually suffer the problem of lower requirement and living quality. This may bring some security problem that we should face. In this research, we construct "Building Administration System" to provide users a tool to perform a standard operation procedure in community management. This powerful tool will also help manager to effectively handle important tasks in property administrating by reducing unnecessary documentation. In the current regulation, all community committee members shall be voted each year. This will seriously affect the cumulative of management knowledge and cause a worse efficiency. In this research, we use Object Oriented concept and Visual Modeling techniques to combine with Interbase, ER/Studio, and Delphi to develop this management system for Building Property. Through the help of current computing technology, we can solve the problem that can not be inherited and the storing of the huge amount of data. In this system, we develop the modules such as Basic Data Module, Administrative Expense Calculation, Receipt Print, and Inquiring for Inheritance. In this system, we have integrated all houses, parking lots, and public equipments in it. Manager will only need to handle some basic accounting data; the system will automatically handle the rest. Through the help of this system, the community management staff can be easily accomplished and put more manpower on some needed aspect to improve the living quality.

  • PDF

Analysis on Subjective Image Quality Assessments for 4K-UHD Video Viewing Environments (4K-UHD 비디오 시청환경 특성분석을 위한 주관적 화질평가 분석)

  • Park, In-Kyung;Ha, Kwang-Sung;Kim, Mun-Churl;Cho, Suk-Hee;Cho, Jin-Soo
    • Journal of Broadcast Engineering
    • /
    • v.15 no.4
    • /
    • pp.563-581
    • /
    • 2010
  • In this paper, we perform subjective visual quality assessments on UHD video for UHD TV services and analyze the assessment results. Demands for video services have been increased with availabilities of DTV, Internet and personal media equipments. With this trend, the demands for high definition video have also been increasing. Currently, 2K-HD ($1920{\times}1080$) video have been widely consumed over DTV, DVD, digital camcoders, security cameras and other multimedia terminals in various types, and recently digital cinema contents of 4K-UHD($3840{\times}2160$) have been popularly produced and the cameras, beam projects, display panels that support for 4K-UHD video start to come out into multimedia markets. Also it is expected that 4K-UHD service will appear soon in broadcasting and telecommunications environments. Therefore, in this paper, subjective assessments of visual quality on resolutions, color formats, frame rates and compression rates have been carried to provide basis information for standardization of signal specification of UHD video and viewing environments for future UHDTV. As the analysis on the assessments, UHD video exhibits better subjective visual quality than HD by the evaluators. Also, the 4K-UHD test sequences in YUV444 shows better subjective visual quality than the 4K-UHD test sequences in YUV422 and YUV420, but there is little perceptual difference on 4K-UHD test sequences between YUV422 and YUV420 formats. For the comparison between different frame rates, 4K-UHD test sequences of 60fps gives better subjective visual quality than those of 30fps. For bit-depth comparison, HD test sequences in 10-bit depth were little differentiated from those in 8-bit depth in subject visual quality assessment. Lastly, the larger the PSNR values of the reconstructed 4K-UHD test sequences are, the higher the subjective visual quality is. Against the viewing distances, the differences among encoded 4K-UHD test sequences were less distinguished in longer distances from the display.

The Impact of Privacy Policy Layout on Users' Information Recognition (사용자 인지 제고를 위한 개인정보 보호정책 알림방식의 비교 연구)

  • Ko, Yumi;Choi, Jaewon;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.183-193
    • /
    • 2014
  • Korean personal data(information) protection law requires privacy policies post on every website. According to recent survey results, users' interests on these policies are low due to these policies' low readability and accessibility. This study proposes a layout that effectively conveys online privacy policy contents, and assesses its impact on information understandability, vividness, and recognition of users. Studies on privacy policies and layouts, media richness theory, social presence theory, and usability are used to develop the new layered approach. Using experiments, three major layouts are evaluated by randomly selected online users. Research results shows that information understandability, vividness, and recognition of privacy policies in the revised-layered approach are higher than those of in the text-only or table-based layouts. This study implies that employing visual guides like icons on privacy policy layouts may increase users' interest in those policies.

A Study on the Multiple Texture Rendering System for 3D Image Signal Recognition (3차원 영상인식을 위한 다중영상매핑 시스템에 대한 연구)

  • Kim, Sangjune;Park, Chunseok
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.1
    • /
    • pp.47-53
    • /
    • 2016
  • Techniques to be developed in this study is intended to apply to an existing integrated control system to "A Study on the multiple Texture Rendering system for three-dimensional Image Signal Recognition" technology or become a center of the building control system in real time video. so, If the study plan multi-image mapping system developed, CCTV camera technology and network technology alone that is, will be a number of security do not have to build a linked system personnel provide services that control while the actual patrol, the other if necessary systems and linked to will develop a system that can reflect the intention Ranger.

A Study of Geostationary Atmospheric Environmental Monitoring Satellite Data Management Policies (정지궤도 대기환경 관측 위성 자료 관리 정책 방안 연구)

  • Choi, Won Jun;Eun, Jong Won
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.4
    • /
    • pp.10-14
    • /
    • 2016
  • Korean satellite development projects were divided military objectives such as national security, and commercial communication satellites. The First geostationary Korean earth observation satellite, GeoKOMPSAT is a turning point to concern another way to utilizing satellite. In the past, the main concern was the sharp ground images, now days, it is more important to make high added value from satellite data. In particular, environmental payload, GEMS mounted on the satellite GeoKOMPSAT-2 will monitor air quality which is not observed by visual material, may be referred to as case by utilizing the satellite. Satellite data utilization is likely to receive a great influence on the appropriate public policy data. If the public is expected to be fully revealed that potential demand. It is time to change the management policy on the security aspects of weak satellite data. Depending on the expanding use of satellites, it is necessary to investigate the status of disclosing satellite data, and suggests policy options for the distribution of materials for the environment satellite characteristics.

The research regarding an information system risk management process characteristics (정보시스템 위험관리 프로세스 특성에 관한 연구)

  • Kim, Tai-Dal;Lee, Hyung-Won
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.303-310
    • /
    • 2007
  • Information system failure is various such as program test unpreparedness, physical facilities for damage prevention unpreparedness from simple software error. Although cross is trifling the result causes vast damage. Recently, became difficult by simple outside security system to solve this problem. Now, synthetic countermove establishment and suitable confrontation connected with danger came in necessary visual point about general Information Technology of enterprise. In connection with, in this paper, various informations and system and control about data that can happen information inside and outside considering integrity for IT resource, solubility, confidentiality within organization studied about special quality to model synthetic Risk Management System that can of course and cope in danger.

North Korean military provocations and the corresponding direction - Focus on the threat that resulted in unequal power wood box mines provocation - (북한군의 군사적 도발 및 대응방향 - 목함 지뢰 도발에 이어진 비대칭전력 위협을 중심으로-)

  • Kim, Gyu Nam
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.59-67
    • /
    • 2015
  • Our vision is to see the North and there is a large visual target that the two exchanges and cooperation and unity that put the main enemy of enemies in mind in need. North Korea is the main enemy was illegal invasion June 25, 1950 July 27, 1953 has continued after the armistice join the illegal provocations and cease fire violations so far. August 4, 2015, North Korea was operating by the power differential that operate on an all-out war and declared the initial state after the exhibition gave another provocative DMZ wood box mines. US-ROK military was in the process of real-time detection of the North Korean power operation and the results were broadcast live through the media. Looking at these military provocations on the threat of asymmetrical power of North Korea's military threat, we would like to present how to respond.