• Title/Summary/Keyword: image security system

Search Result 508, Processing Time 0.025 seconds

Lost and Found Registration and Inquiry Management System for User-dependent Interface using Automatic Image Classification and Ranking System based on Deep Learning (딥 러닝 기반 이미지 자동 분류 및 랭킹 시스템을 이용한 사용자 편의 중심의 유실물 등록 및 조회 관리 시스템)

  • Jeong, Hamin;Yoo, Hyunsoo;You, Taewoo;Kim, Yunuk;Ahn, Yonghak
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.19-25
    • /
    • 2018
  • In this paper, we propose an user-centered integrated lost-goods management system through a ranking system based on weight and a hierarchical image classification system based on Deep Learning. The proposed system consists of a hierarchical image classification system that automatically classifies images through deep learning, and a ranking system modules that listing the registered lost property information on the system in order of weight for the convenience of the query process.In the process of registration, various information such as category classification, brand, and related tags are automatically recognized by only one photograph, thereby minimizing the hassle of users in the registration process. And through the ranking systems, it has increased the efficiency of searching for lost items by exposing users frequently visited lost items on top. As a result of the experiment, the proposed system allows users to use the system easily and conveniently.

  • PDF

3-D Laser Measurement using Mode Image Segmentation Method

  • Moon Hak-Yong;Park Jong-Chan;Han Wun-Dong;Cho Heung-Gi;Jeon Hee-Jong
    • Proceedings of the KIPE Conference
    • /
    • 2001.10a
    • /
    • pp.104-108
    • /
    • 2001
  • In this paper, the 3-D measurement method of moving object with a laser and one camera system for image processing method is presented. The method of segmentation image in conventional method, the error are generated by the threshold values. In this paper, to improve these problem for segmentation image, the calculation of weighting factor using brightness distribution by histogram of stored images are proposed. Therefore the image erosion and spread are improved, the correct and reliable informations can be measured. In this paper, the system of 3-D extracting information using the proposed algorithm can be applied to manufactory automation, building automation, security guard system, and detecting information system for all of the industry areas.

  • PDF

3D Image Qube Password Interface Design and Implementation for Entrance/Exit of Sailors (선박승무원 출입관리를 위한 3차원 영상 큐브 암호 인터페이스 설계 및 구현)

  • Son, Nam-Rye;Jeong, Min-A;Lee, Seong-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.25-32
    • /
    • 2010
  • Recently a passenger ship and liner has been spread throughout men of diversity, the space and informations is not open to general passenger. Therefore security systems are necessary for special sailors to admit them. Although security systems has a variety usage methods which are organism recognition(finger printer, iritis and vein etc) a few years ago, these usages has a defect reusing other objects because of leaving a trace. Therefore this paper designs and implements using 3D Qube image password interface which hand gestures are recognized after acquiring from 2D input image for protective marker of finger printer.

Smart Vehicle Parking Management System using Image Processing

  • Waqas, Maria;Iftikhar, Umar;Safwan, Muhammad;Abidin, Zain Ul;Saud, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.161-166
    • /
    • 2021
  • The term parking management system usually refers to the custom built hardware intensive systems installed in building and malls. However, there are many places where such expensive solutions cannot be installed due to various reasons, like cost and urgent/temporary setup requirements. This project focuses on developing a parking management system based on image processing to detect vacant parking slot in an area where automated systems are not installed. Camera images of the parking area are subjected to image processing algorithm which marks virtual slots in the area and extracts occupancy information to guide the incoming drivers about availability and position of vacant spaces. The application consists of two interfaces: one for the guidance of the incoming drivers and the other one for the administrator. The later interface also informs the administrator if a car is not parked properly in the virtual slot. This parking system would reduce the stress and time wastage associated with car parking and would make the management of such areas less costly.

Invader Detection System Using the Morphological Filtering and Difference Images Based on the Max-Valued Edge Detection Algorithm

  • Lee, Jae-Hyun;Kim, Sung-Shin;Kim, Jung-Min
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.36 no.5
    • /
    • pp.645-661
    • /
    • 2012
  • Recently, pirates are infesting on the sea and they have been hijacking the several vessels for example Samho Dream and Samho Jewelry of Korea. One of the items to reduce the risk is to adopt the invader detection system. If the pirates break in to the ship, the detection system can monitor the pirates and then call the security alarm. The crew can gain time to hide to the safe room and the report can be automatically sent to the control room to cope with the situation. For the invader detection, an unmanned observation system was proposed using the image detection algorithm that extracts the invader image from the recording image. To detect the motion area, the difference value was calculated between the current image and the prior image of the invader, and the 'AND' operator was used in calculated image and edge line. The image noise was reduced based on the morphology operation and then the image was transformed into morphological information. Finally, a neural network model was applied to recognize the invader. In the experimental results, it was confirmed that the proposed approach can improve the performance of the recognition in the invader monitoring system.

Building Cooperation Policing Systems and Roles of Private Security (협력치안체제구축과 민간경비의 역할)

  • Seok, Cheong-Ho
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.67-90
    • /
    • 2010
  • Today, the police alone can not prevent a crime. And the police is limited to meet for people's the increased needs on public safety. So the police and the community needs the cooperation of a variety of resources. Police in cooperation with community resources to respond to the crime's most professional and the private sector is a private security. However, the role of private security for cooperation policing is insufficient in South Korea. So for this study to build a cooperative policing in South Korea as private security for the following four kinds of directions are presented. First, as a private security of the United States and Japan, specializes in diversified business sectors. Simple human-oriented private security of the building security get out. Instead, take the high-tech crime prevention or industry complex security should be changed to a professional organization. Second, the interaction between police and private security should be increased. Police and private security through regular meetings between the need for mutual interests and build consensus is needed. The role of private security companies to be represented on the Security Association of South Korea's active role in the matter. Third, efforts to improve the image of private security activities and the publiciy activity of private security is needed. Some of the private security in an effort to escape a negative image to the people and actively promote a positive image is necessary. Finally, for South Korea to the level the cooperation between the police and private security are required to develop system models. Front-line policing priority in the field and the mutual understanding between the police and private security in an effort to have a positive perception is needed. Equal partners, especially the police and private security to private security companies to have recognized experts in their own recruitment and training should be improved by strengthening the expertise.

  • PDF

Motion Detection using Adaptive Background Image and Pixel Space (적응적 배경영상과 픽셀 간격을 이용한 움직임 검출)

  • 지정규;이창수;오해석
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.3
    • /
    • pp.45-54
    • /
    • 2003
  • Security system with web camera remarkably has been developed at an Internet era. Using transmitted images from remote camera, the system can recognize current situation and take a proper action through web. Existing motion detection methods use simply difference image, background image techniques or block matching algorithm which establish initial block by set search area and find similar block. But these methods are difficult to detect exact motion because of useless noise. In this paper, the proposed method is updating changed background image as much as $N{\times}M$pixel mask as time goes on after get a difference between imput image and first background image. And checking image pixel can efficiently detect motion by computing fixed distance pixel instead of operate all pixel.

  • PDF

A Study on Classification of CNN-based Linux Malware using Image Processing Techniques (영상처리기법을 이용한 CNN 기반 리눅스 악성코드 분류 연구)

  • Kim, Se-Jin;Kim, Do-Yeon;Lee, Hoo-Ki;Lee, Tae-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.634-642
    • /
    • 2020
  • With the proliferation of Internet of Things (IoT) devices, using the Linux operating system in various architectures has increased. Also, security threats against Linux-based IoT devices are increasing, and malware variants based on existing malware are constantly appearing. In this paper, we propose a system where the binary data of a visualized Executable and Linkable Format (ELF) file is applied to Local Binary Pattern (LBP) image processing techniques and a median filter to classify malware in a Convolutional Neural Network (CNN). As a result, the original image showed the highest accuracy and F1-score at 98.77%, and reproducibility also showed the highest score at 98.55%. For the median filter, the highest precision was 99.19%, and the lowest false positive rate was 0.008%. Using the LBP technique confirmed that the overall result was lower than putting the original ELF file through the median filter. When the results of putting the original file through image processing techniques were classified by majority, it was confirmed that the accuracy, precision, F1-score, and false positive rate were better than putting the original file through the median filter. In the future, the proposed system will be used to classify malware families or add other image processing techniques to improve the accuracy of majority vote classification. Or maybe we mean "the use of Linux O/S distributions for various architectures has increased" instead? If not, please rephrase as intended.

Design and Implementation of Information Security System to Prevent Leakage of Drawing Information (설계정보 유출방지를 위한 정보보안시스템 설계 및 구현)

  • Chang, H.B.;Lee, H.S.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.11 no.5
    • /
    • pp.327-334
    • /
    • 2006
  • Recently, security incidents are growing rapidly in which internal employees let the drawing leak out to competitors or other countries. This type of security incidents has a characteristic that it occurs less frequently than other types of security incidents such as network or server security incident, but the damage is a lot more serious. The existing information security technologies to prevent internal information from being leaked out are only applicable to general documents(office documents, web pages and image files in which data are encrypted one by one). However, architectural drawings made up of collection of files with various formats(extensions) have problems with the process speed of en(de) cryption and accuracy, so the developments of security technologies by new methods are required. In this study, we design and develop a security technology based on work area with which users can protect the leakage of critical information in the kernel level while maintaining their work environment when they have to use sharing information that cannot be managed by the unit of file. As a result, we developed the "Virtual Secure Disk" which allows only authorized users and applications to have an access to drawings, and have verified its security by applying it to the actual company.

Design of a Contactless Access Security System using Palm Creases and Palm Vein Pattern Matching (손금과 정맥혈관 패턴매칭을 이용한 비접촉 출입 보안시스템 설계)

  • Ki-Jung Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.327-334
    • /
    • 2024
  • In this paper, we developed a system with a near-infrared LED light source with a wavelength of 950nm to acquire palm vein images and a white LED light source to acquire palm creases based on Raspberry Pi. In addition, we implemented a unique pattern-extractable image processing technology that can prevent counterfeiting and enhance security of mixed creases and palmprints through image pre-processing (Gray scaling, Histogram Equalization, Blurring, Thresholding, Thinning) for the acquired vein and palm images, and secured a source technology that can be used in a security-enhanced system.