• Title/Summary/Keyword: personal video

Search Result 294, Processing Time 0.026 seconds

A Comparative Analysis on ECC(Elliptic Curve Cryptography) Operation Algorit hm for Data Protection in Video security System (영상보안시스템에서의 데이터 보호를 위한 ECC(Elliptic Curve Cryptography) 연산알고리즘 비교분석)

  • Kim, Jongmin;Choo, Hyunwook;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.37-45
    • /
    • 2019
  • Video security systems change from analog based systems to network based CCTVs. Therefore, such network based systems are always exposed not only to threats of eavesdropping and hacking, but to personal damage or public organizations' damage due to image information leakage. Therefore, in order to solve the problem, this study conducts a comparative analysis on proposes the optimal ECC(Elliptic Curve Cryptography) scalar multiplication algorithms for image information protection in data communication process and thereby proposes the optimal operation algorithm of video security system.

Research on Influencing Factors of YouTube Chinese Vdeo User Subscription Motivation: Centered on the Censydiam User Motivation Analysis Model

  • Hou, ZhengDong;Choi, ChulYoung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.95-105
    • /
    • 2019
  • A great deal needs to be learned about why and how users participate and consume information on various online sites. The design of socio-technical systems especially for promoting engagement in terms of maximum user participation is both a theoretical and real-world challenge that researchers strive to understand. At present, most of the research on the motives of Internet video users' behavior focuses on the user's "viewing motivation" and "sharing motivation", and lacks the analysis of the factors affecting users' "subscription motivation". This study will attempt to compensate for this gap. Based on the YouTube platform, we take Chinese video users as the research object and uses the "Censydiam user motivation analysis model" to make assumptions about user subscription motivation from the two levels of social needs and personal needs, using regression analysis. Validate the hypothesis and get the influencing factors that may be available in the user's subscription motivation based on the assumptions. Built on survey data from 215 respondents, the study found that Enjoyment, Vitality, Power, and Conviviality are four factors that influence user motivation.

The Implementation of Video Library using VR (가상현실을 이용한 동화상 도서관의 구현)

  • 김동현
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1456-1461
    • /
    • 2003
  • Recently, the quantity of using information go on increasing geometric-progression. At the same time, the management of information is effected on the most organization's effective operation so that many user call for the powerful equipment which expound. access more information. As information searching technology is concentrated about the object of information based on a letter mainly, an effective searching technology for the object of multimedia such as a still image, a video and a sound must be studied. As a monitor of computer is 2-D, it difficult for one to grasp the whole aspect at a look glance like a library. Accordingly, some condition is necessary. First, it acquired the virtual video, turning a camera around by 30 degrees with a camera of 15mm lens, giving a warping and distortion. Second, it improved the books for user to search easily, adding to the video in existing books information system. The original text suggests some way which can embody the video searching technology under the base of personal computer.

A Design and Implementation of Streamer for Real-Time Wireless Video Surveillance System (실시간 무선 영상 감시시스템을 위한 Streamer의 설계 및 구현)

  • Lee, Jin-Young;Kim, Heung-Jun;Lee, Kwang-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.248-256
    • /
    • 2007
  • Recently, the network Infrastructure grows rapidly and the digital image compression technique has made remarkable progress. Therefore, the demand of the real-time image surveillance system which uses a network camera server has been increasing. Network Camera Server has emerged as an attractive alternative to the CCTV for the wireless video surveillance. In this article, the model of JPEG Streamer for collecting and delivering JPEG image is designed and realized as a key module for the wireless video surveillance system. The thread pool and shared memory have been used to improve the stability and efficiency of the JPEG Streamer. In addition, the concept of double buffering is of much benefit to improve the quality of real-time image. In this article, the wireless video surveillance system by using JPEG Streamer is suggested to send the real-time image through the wireless internet with the personal digital assistance (PDA).

Highlight Detection in Personal Broadcasting by Analysing Chat Traffic : Game Contests as a Test Case (채팅 트래픽 분석을 통한 개인방송 하이라이트 검출 : 게임 콘텐츠를 중심으로)

  • Kim, Eunyul;Lee, Gyemin
    • Journal of Broadcast Engineering
    • /
    • v.23 no.2
    • /
    • pp.218-226
    • /
    • 2018
  • As the number of personal broadcasting contents is rapidly increasing, the demand for a service that provides highlights is growing. A highlight, a collection of interesting scenes, can improve the quality of viewing experience. In this paper, we propose a method to automatically detect highlights using only chat traffic information. We also propose evaluation methods the effectiveness of using chat traffic in highlight detection. We apply the detection algorithm to game broadcasting, which has larger audience, and demonstrate its performance.

Vision-Based Identification of Personal Protective Equipment Wearing

  • Park, Man-Woo;Zhu, Zhenhua
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.313-316
    • /
    • 2015
  • Construction is one of the most dangerous job sectors, which reports tens of thousands of time-loss injuries and deaths every year. These disasters incur delays and additional costs to the projects. The safety management needs to be on the top primary tasks throughout the construction to avoid fatal accidents and to foster safe working environments. One of the safety regulations that are frequently violated is the wearing of personal protection equipment (PPE). In order to facilitate monitoring of the compliance of the PPE wearing regulations, this paper proposes a vision based method that automatically identifies whether workers wear hard hats and safety vests. The method involves three modules - human body detection, identification of safety vest wearing, and hard hat detection. First, human bodies are detected in the video frames captured by real-time on-site construction cameras. The detected human bodies are classified into with/without wearing safety vests based on the color features of their upper parts. Finally, hard hats are detected on the nearby regions of the detected human bodies and the locations of the detected hard hats and human bodies are correlated to reveal their corresponding matches. In this way, the proposed method provides any appearance of the workers without wearing hard hats or safety vests. The method has been tested on onsite videos and the results signify its potential to facilitate site safety monitoring.

  • PDF

A Flexible Protection Technique of an Object Region Using Image Blurring (영상 블러링을 사용한 물체 영역의 유연한 보호 기법)

  • Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.6
    • /
    • pp.84-90
    • /
    • 2020
  • As the uploading and downloading of data through the Internet is becoming more common, data including personal information are easily exposed to unauthorized users. In this study, we detect a target area in images that contain personal information, except for the background, and we protect the detected target area by using a blocking method suitable for the surrounding situation. In this method, only the target area from color image input containing personal information is segmented based on skin color. Subsequently, blurring of the corresponding area is performed in multiple stages based on the surrounding situation to effectively block the detected area, thereby protecting the personal information from being exposed. Experimental results show that the proposed method blocks the object region containing personal information 2.3% more accurately than an existing method. The proposed method is expected to be utilized in fields related to image processing, such as video security, target surveillance, and object covering.

Research on the development of automated tools to de-identify personal information of data for AI learning - Based on video data - (인공지능 학습용 데이터의 개인정보 비식별화 자동화 도구 개발 연구 - 영상데이터기반 -)

  • Hyunju Lee;Seungyeob Lee;Byunghoon Jeon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.56-67
    • /
    • 2023
  • Recently, de-identification of personal information, which has been a long-cherished desire of the data-based industry, was revised and specified in August 2020. It became the foundation for activating data called crude oil[2] in the fourth industrial era in the industrial field. However, some people are concerned about the infringement of the basic rights of the data subject[3]. Accordingly, a development study was conducted on the Batch De-Identification Tool, a personal information de-identification automation tool. In this study, first, we developed an image labeling tool to label human faces (eyes, nose, mouth) and car license plates of various resolutions to build data for training. Second, an object recognition model was trained to run the object recognition module to perform de-identification of personal information. The automated personal information de-identification tool developed as a result of this research shows the possibility of proactively eliminating privacy violations through online services. These results suggest possibilities for data-based industries to maximize the value of data while balancing privacy and utilization.

  • PDF

Implementation of Testbed System for proving IMT-2000 Switching Technology (IMT-2000 교환기능 검증을 위한 테스트베드 구축)

  • 이현진;조기성
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.453-456
    • /
    • 2000
  • This paper describes IMT-2000 Testbed System which consists of ATM based IMT-2000 exchange(A-lMX), RNC simulator, HLR simulator, SCP simulator, B-ISDN subscriber simulator and MS simulator. Simulators were developed to verify the mobile functions and basic services of IMT-2000 like Videophone, VoD(Video on Demand), and Internet access. UPT(Universal Personal Telecommunication) service could be adapted well to this testbed system. Until the entire network elements are developed fully, this testbed system can be used to prove new services in IMT-2000 network.

  • PDF

Constructing a Wireless Remote Video Surveillance System using Personal Digital Assistants(PDAs) (개인 휴대 단말기를 이용한 무선 원격 영상 감시 시스템 구축)

  • 허혜선;이용일;신준호;박대훈;홍윤식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.457-459
    • /
    • 2002
  • 본 논문에서는 고정된 공간에서 유선 인터넷망에 접속하던 환경에서 벗어나 휴대성과 이동성의 특징을 갖는 개인 휴대 단말기(PDA)에 무선 랜 카드를 장착하여 이동 중에도 무선 인터넷에 접속하여 실시간으로 영상을 전송 받아 원하는 장소를 감시 할 수 있는 시스템을 구축하여 공간적 한계를 극복하는데 초점을 맞추고 있다.

  • PDF