• Title/Summary/Keyword: Visual Security

Search Result 251, Processing Time 0.023 seconds

Legal System and Regulation Analysis by S/W Development Security (승강기 내에서 폭행의 추출)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.205-207
    • /
    • 2014
  • This paper uses $Color-x^2$ histogram that is composed of merits of color histogram and ones of histogram, in order to efficiently extract violent scenes in elevator. Also, we use a threshold so as to find out key frame, by use of existing $Color-x^2$ histogram. To increase the probability that discerns whether a real violent scene or not, we take advantage of statistical judgments with 20 sample visual images.

  • PDF

A Study on the Methods of Fault Analysis to Improve Safety in U-Healthcare System for Managing Emergency Rescue for Seniors (시니어들의 응급구난 관리를 위한 U-Healthcare시스템에서 안전성 개선을 위한 결함 분석 방법에 관한 연구)

  • Kim, Gyu-A;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.2
    • /
    • pp.170-179
    • /
    • 2014
  • Recently the U-Healthcare system has been rapidly advanced to manage emergence rescue for seniors. We can access emergency rescue systems with high quality services anytime, anywhere under ubiquitous healthcare systems. The more the various systems develop, the more software security systems become important. Therefore, the safety-critical system has been widely spread to the world by advancement of the information and communication technologies. There are a lot kind of fault analysis methods to evaluate software security systems. However due to characteristics of software that is not applied by human error, it can be prevented the enormous damages and losses from improving the safety of safety-critical system. So this paper proposes an integration method of FTA and Forward and Backward FMECA. This method has each strength of FTA and FMECA which is visual and numeric in normalization. First, by use of FTA, we can redraw FTA with Forward FMECA and Backward FMECA in consideration of occurrence, severity, detection, correctness, robustness, and security. Also according to value of NRVP at each event, we can modify FTA diagrams as shown critical paths given by severity and occurrence. Also, we propose the improved emergency rescue service platform of ubiquitous healthcare systems through identifying priorities of the criticality according to normalized risk priority values (NRPV).

The Effect of Job Stress and Turnover Intention among the Employee of Private Security (민간경비원의 직무스트레스가 이직의사에 미치는 영향)

  • Park, Young-Jin;Ahn, Hwang-Kwon;Wang, Sug-Won
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.177-200
    • /
    • 2006
  • This research result that analysis as following. First, difference that keep in mind partially as result that verify difference of job-stress by demography special qualitys that is common people guard's society and turnover intention appeared. Second, result that analyze relation with job-stress and turnover intention, displayed statical correlation in job environment. Third, result that keep in mind as statistical as result that verify effect that common people guard's job-stress gets to turnover intention appeared. During is job-stress variable, was expose that exert effect that keep in mind to turnover intention job surrounding and job special quality. Suggestion point through this research as following be. To raise common people guard's job-stress and turnover intention. system improvement strategy about social estimation etc.. is effective, and do on the basis of this and may have to establish common people guard's enhancing morale plan strategy, low complement that can exert negative impact in change of post for example, line of duty that it is seldom competence, daytime that can elicit common people guards' job satisfaction. Is in visual point that activation of continuous research is leaned against by depth interview and review through qualitative research was insufficient relatively in virtue research so far in research after.

  • PDF

Physical Health Status, Depression and Activities of Daily Living of the Low-income Elderly Living Alone in Metropolitan Areas (대도시 저소득 독거노인의 신체적 건강상태, 우울 및 일상 활동 능력)

  • Kim, Yeon-Hwa
    • Research in Community and Public Health Nursing
    • /
    • v.16 no.2
    • /
    • pp.137-147
    • /
    • 2005
  • Purpose: This study was conducted to investigate physical health status. depression. activities of daily living (ADL & IADL) of the low-income elderly who live alone in urban areas. Method: The subjects were the 400 low-income elders who live alone in Daegu city and the following instruments were used: 1. The number of self-reported physical health problems and present diseases: 2. CES-D scale for depression by Jo Nam-Oak et al. (1998): and 3. ADL scale by Katz (1989) and IADL scale by Lawton and Brody (1969). Results: 1. Visual difficulty was the most prevailing problem (55.3%) among physical problems. the second bowel elimination and the third hearing disturbance. As for present diseases. arthritis (26.5%), hypertension(24.3%) and DM (11.8%) were the most common diseases. 2. There were significant differences in physical health status according to age (t=3.115. p=.045). kind of medical security (t=-1.973. p=.049). perceived life satisfaction (F=4.966. p=.007) and the number of present diseases (F=2.937. p=.033). 3. There were significant differences in depression according to sex (t=-3.758. p=.000) . kind of medical security (t=-4.368. p=.000). perceived life satisfaction (F=35.743. p=.000) and the number of present diseases (F=4.246. p=.006). 4. There were significant differences in ADL according to sex (t=-2.136. p=.033) and age (F=4.863. p=.008). and in IADL according to sex (t=4.552, p=.000), age (F=3.090. p=.047) and kind of medical security (t=-3.306. p=.001). 5. Physical health state was correlated positively with both the number of present diseases (r=.140. p=.005) and depression (r=.352. p=.000), and negatively with ADL (r=-.176. p= .000) and IADL (r= -.230. p=.000). Depression was correlated positively with the number of present diseases (r=.169. p=.001) and negatively with both ADL (r=-.139. p=.005) and IADL (r=-.203. p= .000). Conclusion: The results of this study suggest that general characteristics are important factors for physical health status, depression. ADL and IADL of the low-income elderly who live alone and there are close relations among physical health status, the number of diseases, depression, ADL and IADL. Therefore, these results must be reflected in community health programs for the low-income elderly who live alone. In addition, this kind of study must be extended to the low-income elderly who live alone in rural areas.

  • PDF

Data Modeling for Cyber Security of IoT in Artificial Intelligence Technology (인공지능기술의 IoT 통합보안관제를 위한 데이터모델링)

  • Oh, Young-Taek;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.57-65
    • /
    • 2021
  • A hyper-connected intelligence information society is emerging that creates new value by converging IoT, AI, and Bigdata, which are new technologies of the fourth industrial revolution, in all industrial fields. Everything is connected to the network and data is exploding, and artificial intelligence can learn on its own and even intellectual judgment functions are possible. In particular, the Internet of Things provides a new communication environment that can be connected to anything, anytime, anywhere, enabling super-connections where everything is connected. Artificial intelligence technology is implemented so that computers can execute human perceptions, learning, reasoning, and natural language processing. Artificial intelligence is developing advanced technologies such as machine learning, deep learning, natural language processing, voice recognition, and visual recognition, and includes software, machine learning, and cloud technologies specialized in various applications such as safety, medical, defense, finance, and welfare. Through this, it is utilized in various fields throughout the industry to provide human convenience and new values. However, on the contrary, it is time to respond as intelligent and sophisticated cyber threats are increasing and accompanied by potential adverse functions such as securing the technical safety of new technologies. In this paper, we propose a new data modeling method to enable IoT integrated security control by utilizing artificial intelligence technology as a way to solve these adverse functions.

Private Blockchain and Biometric Authentication-based Chronic Disease Management Telemedicine System for Smart Healthcare (스마트 헬스케어를 위한 프라이빗 블록체인과 생체인증기반의 만성질환관리 원격의료시스템)

  • Young-Ae Han;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.33-39
    • /
    • 2023
  • As the number of people with chronic diseases increases due to an aging society, it is urgent to prevent and manage their diseases. Although biometric authentication methods and Telemedicine Systems have been introduced to solve these problems, it is difficult to solve the security problem of medical information and personal authentication. Since smart healthcare includes personal medical information of subjects, the security of personal information is the most important field. Therefore, in this paper, we tried to propose a Telemedicine System using a smart wearable device ECG in the form of a wristband and face personal authentication in a private blockchain environment. This system targets various medical personnel and patients with chronic diseases in all regions, and uses a private blockchain that can increase data integrity and transparency, ECG and face authentication that are difficult to forge and alter and have high personal identification to provide a system with high security and reliability. composed. Through this, it is intended to contribute to increasing the efficiency of chronic disease management by focusing on disease prevention and health management for patients with chronic diseases at home.

The Evaluation of Crime Prevention Environment for Cultural Heritage using the 3D Visual Exposure Index (3D 시각노출도를 이용한 문화재 범죄예방환경의 평가)

  • Kim, Choong-Sik
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.35 no.1
    • /
    • pp.68-82
    • /
    • 2017
  • Strengthening surveillance, one of the most important factors in the crime prevention environment of cultural heritages, has difficulty in evaluating and diagnosing the site. For this reasons, surveillance enhancement has been assessed by modelling the shape of cultural heritage, topography, and trees digitally. The purpose of this study is to develop the evaluation method of crime prevention environment for cultural heritage by using the 3D visual exposure index (3DVE) which can quantitatively evaluate the surveillance enhancement in three dimensions. For the study, the evaluation factors were divided into natural, organizational, mechanical, and integrated surveillance. To conduct the analysis, the buildings, terrain, walls, and trees of the study site were modeled in three dimensions and the analysis program was developed by using the Unity 3D. Considering the working area of the person, it is possible to analyze the surveillance point by dividing it into the head and the waist position. In order to verify the feasibility of the 3DVE as the analysis program, we assessed the crime prevention environment by digitally modeling the Donam Seowon(Historic Site No. 383) located in Nonsan. As a result of the study, it was possible to figure out the problems of patrol circulation, the blind spot, and the weak point in natural, mechanical, and organizational surveillance of Donam Seowon. The results of the 3DVE were displayed in 3D drawings, so that the position and object could be identified clearly. Surveillance during the daytime is higher in the order of natural, mechanical, and organizational surveillance, while surveillance during the night is higher in the order of organizational, mechanical, and natural surveillance. The more the position of the work area becomes low, the more it is easy to be shielded, so it is necessary to evaluate the waist position. It is possible to find out and display the blind spot by calculating the surveillance range according to the specification, installation location and height of CCTV. Organizational surveillance, which has been found to be complementary to mechanical surveillance, needs to be analyzed at the vulnerable time when crime might happen. Furthermore, it is note that the analysis of integrated surveillance can be effective in examining security light, CCTV, patrol circulation, and other factors. This study was able to diagnose the crime prevention environment by simulating the actual situation. Based on this study, consecutive researches should be conducted to evaluate and compare alternatives to design the crime prevention environment.

A Data Hiding Scheme for Binary Image Authentication with Small Image Distortion (이미지 왜곡을 줄인 이진 이미지 인증을 위한 정보 은닉 기법)

  • Lee, Youn-Ho;Kim, Byoung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.73-86
    • /
    • 2009
  • This paper proposes a new data hiding scheme for binary image authentication with minimizing the distortion of host image. Based on the Hamming-Code-Based data embedding algorithm, the proposed scheme makes it possible to embed authentication information into host image with only flipping small number of pixels. To minimize visual distortion, the proposed scheme only modifies the values of the flippable pixels that are selected based on Yang et al's flippablity criteria. In addition to this, by randomly shuffling the bit-order of the authentication information to be embedded, only the designated receiver, who has the secret key that was used for data embedding, can extract the embedded data. To show the superiority of the proposed scheme, the two measurement metrics, the miss detection rate and the number of flipped pixels by data embedding, are used for the comparison analysis between the proposed scheme and the previous schemes. As a result of analysis, it has been shown that the proposed scheme flips smaller number of pixels than the previous schemes to embed the authentication information of the same bit-length. Moreover, it has been shown that the proposed scheme causes smaller visual distortion and more resilient against recent steg-analysis attacks than the previous schemes by the experimental results.

A Study on Consumers' regulatory focus as a determinant of perceived value of online shopping mall VMD (온라인 쇼핑몰VMD에 대한 지각된 가치의 영향요인으로 소비자 조절초점 역할에 관한 연구)

  • Suh, Yonghan
    • Management & Information Systems Review
    • /
    • v.33 no.5
    • /
    • pp.213-232
    • /
    • 2014
  • Sensitivity to online store stimuli (VMD attributes) and response (online store loyalty) may depend upon consumers' regulatory focus (emotional state). In other words, consumers' sensitivity to online store atmosphere and consequent store loyalty can be influenced by the match between their regulatory focus (promotion focused vs. prevention focused) and the type of the online store VMD benefits Study 1 results indicate consumers have a different evaluation about online store atmosphere depending on their regulatory focus. Promotion-focused consumers were significantly more sensitive to visual appeal and entertainment attributes of online store atmospherics than prevention-focused consumers. Conversely, prevention-focused consumers were significantly more sensitive to security and privacy attributes of online store, than promotion-focused consumers. Study 2 results indicate for promotion-focused shoppers, hedonic value toward online store atmosphere was associated with greater online store loyalty. In contrast, prevention-focused shoppers were influenced more by the utilitarian attributes on online store loyalty than promotion-focused shoppers. The current findings indicate that shoppers with promotion-focused are more easily persuaded by visual and entertainment-oriented online store cues. Conversely, shoppers with prevention-focus are more easily persuaded by safety and privacy-oriented online store cues.

  • PDF

Hybrid Detection Algorithm of Copy-Paste Image Forgery (Copy-Paste 영상 위조의 하이브리드 검출 알고리즘)

  • Choi, YongSoo;Atnafu, Ayalneh Dessalegn;Lee, DalHo
    • Journal of Digital Contents Society
    • /
    • v.16 no.3
    • /
    • pp.389-395
    • /
    • 2015
  • Digital image provides many conveniences at the internet environment recently. A great number of applications, like Digital Library, Stock Image, Personal Image and Important Information, require the use of digital image. However it has fatal defect which is easy to be modified because digital image is only electronic file. Numerous digital image forgeries have become a serious problem due to the sophistication and accessibility of image editing software. Copy-Move forgery is the simplest type of forgery that involves copying portion of an image and paste it on different location within the image. There are many approaches to detect Copy-Move forgery, but all of them have their own limitations. In this paper, visual and invisible feature based forgery detection techniques are tested and analyzed. The analysis shows that pros and cons of these two techniques compensate each other. Therefore, a hybrid of visual based and invisible feature based forgery detection that combine the merits of both techniques is proposed. The experimental results show that the proposed algorithm has enhanced performance compared to individual techniques. Moreover, it provides more information about the forgery, like identifying copy and duplicate regions.