• Title/Summary/Keyword: personal video

Search Result 294, Processing Time 0.029 seconds

The implementation of home-server for intelligent Personal Video Recorder (지능형 PVR의 원격제어를 위한 홈 서버 구현)

  • Son, Kang-Sun;Oh, Young-Ho;Kim, Dae-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.414-416
    • /
    • 2004
  • The intelligent PVR(Personal Video Recorder) is an enhanced PVR that provides viewers with some advanced features as well as pause, instant replay, search and skip forward found in conventional PVRs. By embedding a home server into a PVR, it is possible for an intelligent PVR to provide a powerful web-based management user interface constructed using HTML, graphics and other features common to web-browsers. When applied to other embedded systems, web technologies offer graphical user interfaces which are user-friendly, inexpensive, cross-platform and network-ready. It is the purpose of this paper to introduce implementation of intelligent PVR which is control by internet. We present the architecture of an home- server with a simple but powerful web-based network interconnection.

  • PDF

Performance Study on ZigBee-Based Wireless Personal Area Networks for Real-Time Health Monitoring

  • Koh, Bernard Kai-Ping;Kong, Peng-Yong
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.537-540
    • /
    • 2006
  • When multiple ZigBee wireless personal area networks (WPANs) are in close proximity to each other, contentions and collisions in transmissions will lead to increased packet delays. However, there is no existing study on how delay performance would be affected in a crowded real-life environment where each person walking down a busy street would be wearing a ZigBee WPAN. This letter studies the use of ZigBee WPANs in such a real-life environment for real-time heart beat monitoring. To be pragmatic, we derived a mobility pattern from the analysis of a real-life video trace. Then, we estimated the delay performance from the video trace by combining data collected from ZigBee experiments. The results show that the 300 ms packet delay requirement will not be met for only 11% of the time. When failure occurs, it will last for an average duration of 1.4 s.

  • PDF

Privacy-Preserving H.264 Video Encryption Scheme

  • Choi, Su-Gil;Han, Jong-Wook;Cho, Hyun-Sook
    • ETRI Journal
    • /
    • v.33 no.6
    • /
    • pp.935-944
    • /
    • 2011
  • As a growing number of individuals are exposed to surveillance cameras, the need to prevent captured videos from being used inappropriately has increased. Privacy-related information can be protected through video encryption during transmission or storage, and several algorithms have been proposed for such purposes. However, the simple way of evaluating the security by counting the number of brute-force trials is not proper for measuring the security of video encryption algorithms, considering that attackers can devise specially crafted attacks for specific purposes by exploiting the characteristics of the target video codec. In this paper, we introduce a new attack for recovering contour information from encrypted H.264 video. The attack can thus be used to extract face outlines for the purpose of personal identification. We analyze the security of previous video encryption schemes against the proposed attack and show that the security of these schemes is lower than expected in terms of privacy protection. To enhance security, an advanced block shuffling method is proposed, an analysis of which shows that it is more secure than the previous method and can be an improvement against the proposed attack.

Copyright Protection using Encryption of DCT Coefficients and Motion Vector in Video Codec of Mobile Device (모바일 기기내의 비디오 코덱에서 DCT 계수와 움직임 벡터의 암호화를 이용한 저작권 보호)

  • Kwon, Goo Rak;Kim, Young Ro
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.41-46
    • /
    • 2008
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. In this paper, we propose the copyright protection using encryption of DCT coefficients and motion vector in MPEG-4 video codec of mobile device. This paper presents a new Digital Rights Management that modifies the Motion Vector of Macroblock for mobile device. Experimental results indicate that the proposed DRM can not only achieve very low cost of the encryption but also enable separable authentication to individual mobile devices such as Portable Multimedia Player and Personal Digital Assistants. The performance of the proposed methods have low complexity and low increase of bit rate in overhead.

Exploring Factors Affecting Active Video Gaming and General Physical Activity

  • Choi, Ji Hye
    • Journal of Korea Game Society
    • /
    • v.22 no.1
    • /
    • pp.99-108
    • /
    • 2022
  • Despite the widespread use of digital games as a means of promoting physical activity, little is known about the factors that affect active video gaming. Based on the ecological model of health behavior, this study examined how personal, environmental, and social factors would influence active video gaming and general physical activity. The results showed that while all three factors significantly influence general physical activity, social factor is the only factor that affects active video gaming. The finding highlights the importance of social factors in predicting the use of active video games.

The research of transmission delay reduction for selectively encrypted video transmission scheme on real-time video streaming (실시간 비디오 스트리밍 서비스를 위한 선별적 비디오 암호화 방법의 전송지연 저감 연구)

  • Yoon, Yohann;Go, Kyungmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.4
    • /
    • pp.581-587
    • /
    • 2021
  • Real-time video streaming scheme for multimedia content delivery and remote conference services is one of technologies that are significantly sensitive to data transmission delay. Recently, because of COVID-19, real-time video streaming contents for the services are significantly increased such as personal broadcasting and remote school class. In order to support the services, there is a growing emphasis on low transmission delay and secure content delivery, respectively. Therefore, our research proposed a packet aggregation algorithm to reduce the transmission delay of selectively encrypted video transmission for real-time video streaming services. Through the application of the proposed algorithm, the selectively encrypted video framework can control the amount of MPEG-2 TS packets for low latency transmission with a consideration of packet priorities. Evaluation results on testbed show that the application of the proposed algorithm to the video framework can reduce approximately 11% of the transmission delay for high and low resolution video.

A Study on Development Plan, Comparison & Analysis of Digital CATV and IPTV (디지털 CATV와 IPTV의 수신제한시스템 비교분석 및 발전방안 연구)

  • Park, Jiun;Shin, Seung-Jung;You, Hee-kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.173-178
    • /
    • 2008
  • With the discontinuation of analog broadcasting in 2012, the cable broadcasters are investing in the conversion to DCATV (Digital Cable TV). DCATV is providing various broadcast of high quality to audiences through paid broadcasting called PPV (Pay Per View). Such services are using various kinds of CASs (Conditional Access System) in order to verify the viewing rights of subscriber. In addition, to respond to the fast changing environment of digital broadcast, not only simple digitalization of broadcast but also services such as PVR (Personal Video Recorder) and VOD (Video On Demand) are provided to subscribers. Because these additional services have many difficult areas to cover with traditional CAS alone, a new plan has become necessary. With the improvement of related regulations in 2008, the test service of IPTV (Internet Protocol TV) which is a broadcast service through the internet started. Because like DCATV, IPTV also sets the real time broadcast and the VOD service as the basic services, the use of appropriate CAS is required. In this study, the CASs for DCATV and IPTV undergo comparative analysis, and the development direction which will benefit both subscribers and broadcasting companies is suggested.

  • PDF

Implementation of a face detection algorithm for the identification of persons (동영상에서 인물식별을 위한 얼굴검출 알고리즘 구현)

  • Cho, Mi-Nam;Ji, Yoo-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.85-91
    • /
    • 2011
  • The technique, which is able to detect and recognize characters in videos such as a movie or TV drama, can be used for applications which are database management of a general user's facial images for the suppliers of PVR(personal video recorder), mobile phones, and multimedia, etc. In this paper, we propose a face detection algorithm. It searches the character through cast indexing when the scene is changed in video. It is consisted of three stages. The first step is the detection-step of the scene change after producing a paused image. The second step is the face detection-step using color information. The final step is the detection-step which detects its features by the facial boundary. According to the experimental result, it has detected faces in different conditions successfully and more advanced than the existing other one that are using only color information.

Research for improving vulnerability of unmanned aerial vehicles (무인항공기 보안 취약점 개선을 위한 연구)

  • Lee, Kyung-Hwan;Ryu, Gab-Sang
    • Smart Media Journal
    • /
    • v.7 no.3
    • /
    • pp.64-71
    • /
    • 2018
  • Utilization of unmanned aerial vehicles (UAVs) are rapidly expanding to various fields ranging from defense, industry, entertainment and personal hobbies. Due to the increased activities of unmanned airplanes, many security problems have emerged, including flight path errors to undesired destinations, secondary threats due to exposed securities caused by the capture of unmanned airplanes in hostile countries. In this paper, we find security vulnerabilities in UAVs such as GPS spoofing, hacking captured video information, malfunction due to signal attenuation through jamming, and exposure of personal information due to image shooting. In order to solve this problem, the stability of the unstructured data is secured by setting the encryption of the video shooting information section using the virtual private network (VPN) to prevent the GPS spoofing attack. In addition, data integrity was ensured by applying personal information encryption and masking techniques to minimize the secondary damage caused by exposure of the UAV and to secure safety. It is expected that it will contribute to the safe use and stimulation of industry in the application field of UAV currently growing.

A Study on COP-Transformation Based Metadata Security Scheme for Privacy Protection in Intelligent Video Surveillance (지능형 영상 감시 환경에서의 개인정보보호를 위한 COP-변환 기반 메타데이터 보안 기법 연구)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.417-428
    • /
    • 2018
  • The intelligent video surveillance environment is a system that extracts various information about a video object and enables automated processing through the analysis of video data collected in CCTV. However, since the privacy exposure problem may occur in the process of intelligent video surveillance, it is necessary to take a security measure. Especially, video metadata has high vulnerability because it can include various personal information analyzed based on big data. In this paper, we propose a COP-Transformation scheme to protect video metadata. The proposed scheme is advantageous in that it greatly enhances the security and efficiency in processing the video metadata.