• 제목/요약/키워드: image sharing

Search Result 298, Processing Time 0.035 seconds

Real-time Vehicle Tracking Algorithm According to Eigenvector Centrality of Weighted Graph (가중치 그래프의 고유벡터 중심성에 따른 실시간 차량추적 알고리즘)

  • Kim, Seonhyeong;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.4
    • /
    • pp.517-524
    • /
    • 2020
  • Recently, many researches have been conducted to automatically recognize license plates of vehicles and use the analyzed information to manage stolen vehicles and track the vehicle. However, such a system must eventually be investigated by people through direct monitoring. Therefore, in this paper, the system of tracking a vehicle is implemented by sharing the information analyzed by the vehicle image among cameras registered in the IoT environment to minimize the human intervention. The distance between cameras is indicated by the node and the weight value of the weighted-graph, and the eigenvector centrality is used to select the camera to search. It demonstrates efficiency by comparing the time between analyzing data using weighted graph searching algorithm and analyzing all data stored in databse. Finally, the path of the vehicle is indicated on the map using parsed json data.

PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation

  • Kim, Aeyoung;Wang, Changda;Seo, Seung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2919-2937
    • /
    • 2020
  • Post-Quantum Cryptography (PQC) is rapidly developing as a stable and reliable quantum-resistant form of cryptography, throughout the industry. Similarly to existing cryptography, however, it does not prevent a third-party from using the secret key when third party obtains the secret key by deception, unauthorized sharing, or unauthorized proxying. The most effective alternative to preventing such illegal use is the utilization of biometrics during the generation of the secret key. In this paper, we propose a biometric-based secret key generation scheme for multivariate quadratic signature schemes, such as Rainbow. This prevents the secret key from being used by an unauthorized third party through biometric recognition. It also generates a shorter secret key by applying Principal Component Analysis (PCA)-based Confidence Interval Analysis (CIA) as a feature extraction method. This scheme's optimized implementation performed well at high speeds.

A Prototype of Telepresent Surgical Simulation System (원격 모의 수술 시스템 프로토타입)

  • 남상아
    • Journal of the Korea Society for Simulation
    • /
    • v.6 no.2
    • /
    • pp.31-44
    • /
    • 1997
  • In medical applications, the cooperation work using computer network is in the spotlight as next generation technology, because it offers sharing of equipments, knowledge of specialists, and data and surmounts the limitations of geographical position and time. We present a prototype of telepresent surgical simulation system in this treatise. It is a telemedicine system using volume image, which is reconstructed from radiological images such as MRI and CT. It is used as a tool for surgical simulation among telepresent doctors. It provides the functions of conference control, volume reconstruction and manipulation, and multimedia database management among one server and multi-clients through high-speed network. It is implemented on Unix workstation using X-windows and C language, TCP/IP protocol and UNiSQL as DBMS.

  • PDF

Dual Autostereoscopic Display Platform for Multi-user Collaboration with Natural Interaction

  • Kim, Hye-Mi;Lee, Gun-A.;Yang, Ung-Yeon;Kwak, Tae-Jin;Kim, Ki-Hong
    • ETRI Journal
    • /
    • v.34 no.3
    • /
    • pp.466-469
    • /
    • 2012
  • In this letter, we propose a dual autostereoscopic display platform employing a natural interaction method, which will be useful for sharing visual data with users. To provide 3D visualization of a model to users who collaborate with each other, a beamsplitter is used with a pair of autostereoscopic displays, providing a visual illusion of a floating 3D image. To interact with the virtual object, we track the user's hands with a depth camera. The gesture recognition technique we use operates without any initialization process, such as specific poses or gestures, and supports several commands to control virtual objects by gesture recognition. Experiment results show that our system performs well in visualizing 3D models in real-time and handling them under unconstrained conditions, such as complicated backgrounds or a user wearing short sleeves.

The Study on a Semi-automated Mapping System (반자동 지도입력 시스템기술 개발 연구)

  • 윤재경;이기혁;우창헌;이경자;김수용
    • Spatial Information Research
    • /
    • v.3 no.1
    • /
    • pp.19-27
    • /
    • 1995
  • In this paper, a semi-automated mapping system, which can produ¬ce digital maps by using information acquired from pre-processing procedure, was introduced. To get a binary edge image, which is very important in vectori¬zation process, we applied adaptive smoothing and connection preserving thresho¬Iding algorithm. In mapper program, binary images are converted to vectors and for in-core data structure, extended PR quad tree was used. These procedures are dispatched to personal computers and workstations and through network resource sharing, the whole process was unified and simplified.

  • PDF

Study on unique code by each 3D model for broadcast communication harmony service. (방송통신융합 서비스를 위한 3D 모델별 고유 코드에 관한 연구)

  • Park, In-Gyu;Park, Jun-Yeol;Kim, Joon-Won
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.49-50
    • /
    • 2007
  • We are now using separate ID Database, Permission System, OS and Standard Data Format in PC, Cell phone, IPTV service and these are not good in many kind of usage, data sharing, contents servicing and supervising efficiency To merge these multiple services into one system we need to make a single ID systems for all and this paper will gide you to the new ID system that was much better than the old one. This new type of ID system is made with 3D Data and this will give fantastic visual effect & rich information data to the ID users in 3D way which is much better than 2D image & Text information technology.

  • PDF

Output Phase Synchronization Method of Inverter for Parallel Operation of Uninterruptible Power System (무정전전원장치 병렬운전을 위한 인버터의 출력 위상 동기화 방법)

  • Kim, Heui-Joo;Park, Jong-Myeon;Oh, Se-Hyung
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.25 no.3
    • /
    • pp.235-241
    • /
    • 2020
  • In this paper, we propose the bus/bypass synchronization phase lock loop (B-Sync PLL) method using each phase voltage controller of a parallel UPS inverter. The B-Sync PLL included in each phase voltage control system of parallel UPS inverters has the transient response and the phase synchronization error at grid normal or blackout. The validity of this method is verified by simulation and experiment. As a result, the parallel UPS inverters using the proposed method confirmed that the output phase was continuously synchronized when a grid blackout, improving the transient response characteristics for stable load power supply and equal load sharing.

A Design of Sharing Environment for Reusing Image Processing Component (영상처리 컴포넌트의 효과적인 재사용을 지원하는 공유환경의 설계)

  • Cho, Young-Tak;Awe, Jee-Soo;Chae, Ok-Sam
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.886-888
    • /
    • 2005
  • 영상처리분야의 연구개발은 특정 분야에 특화된 알고리즘을 이용하고, 이러한 특수성으로 인해 유사한 기능을 반복적으로 구현하는 문제점을 안고 있다. 특히 연구개발결과물의 공유환경이 마련되어있지 않아 이러한 문제점을 더욱 가중시켜 연구개발비용의 증가를 유발하고 있다. 본 논문에서는 이러한 문제점을 해결하기 위해 영상처리용 통합개발환경과 연계된 P2P기반의 공유체계를 제안한다. 제안된 시스템은 많은 비용을 들여 연구개발한 영상처리 알고리즘이 사장되는 위험을 감소시키고 재활용 가능성을 높일 것으로 기대한다.

  • PDF

Stuty on Access Control measure for secure image management in CCTV Integrated Control center (CCTV통합관제센터에서 안전한 영상 관리를 위한 접근 제어 방안 연구)

  • Lee, Jae-Seung;Kim, Hyung-Joo;Choi, Won-Kyu;Jun, Moon-Seog
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.842-844
    • /
    • 2013
  • 범죄예방이나 위급사항에 대한 대응 등 CCTV의 다양한 필요성에 따라 CCTV를 통합관리하는 CCTV 통합관제 센터가 늘어나고 있다. 행정안전부는 2015년까지 전국 시군구에 CCTV 통합관제센터 구축을 추진하고 있어 앞으로도 계속적으로 증가할 예정이다. 하지만 CCTV관제센터는 증가하고 있음에도 이를 관리할 전문 모니터링 요원이 부족하며, 동시에 이들이 영상정보를 개인의 호기심이나 이득을 위해 사용하는 일이 발생 할 수 있다. 본 논문을 Shamir's Secret Sharing 방법을 이용하여 암호화된 키를 분배하고 요청에 따라 일정 수 이상의 분배키가 모이면 영상 열람권한을 주는 방식으로 설계 하여 관리자가 임의로 영상정보에 접근하는 상황을 방지하였다. 또한 암호키와 랜덤한 값을 이용한 세션키 생성 등을 통해 다양한 보안위협에도 대응하였다.

Digital Fashion Image Aura represented in the Burberry Instagram (버버리 인스타그램에 나타난 디지털 패션이미지 아우라)

  • Suh, Sungeun
    • Journal of the Korean Society of Costume
    • /
    • v.67 no.3
    • /
    • pp.115-132
    • /
    • 2017
  • This study recognizes the importance of the social network platform as a new fashion media, and analyzes the significance of various digital fashion images, based on the 'Aura' theory of Walter Benjamin. The concept of "Disappearance of Artistic Aura" can be summarized into three discussions: 1) the change in the way of artistic perception, which is changes in value from worship to exhibition. 2) the change in the way of artistic acceptance, from personal to mass. 3) the emergence of new artistic concepts such as camera and film. By reviewing characteristics of the $21^{st}$ digital replication era, the study tried to discover and evaluate the expanded significance of the 'Aura' represented on digital fashion images, which are infinitely generated, modified, reproduced, transmitted, and shared in social network environments. The 'Burberry Instagram' was chosen as the subject of the study. The study reviewed around 2,500 images, which were uploaded from February 2011 to July 2016, and selected 200 images deemed the most representative of Burberry, and categorized and analyzed by the extended concept of 'Aura'. The study results as follows: First, the 'Aura' in digital fashion image appearing on social network platforms signifies the expansion of product value in fashion, and it also represents inherited traditions and modernization of images. Second, it also signifies the democratization and globalization of fashion through the open replication and sharing as well as the interaction of criticism and acceptance. Third, it signifies the personalized taste and fashion as everyday lifestyle, through personalized services, securing playful space, and real-time updates.