KR101757682B1 - Outside diversion preventing method of security image and system therof - Google Patents

Outside diversion preventing method of security image and system therof Download PDF

Info

Publication number
KR101757682B1
KR101757682B1 KR1020160003021A KR20160003021A KR101757682B1 KR 101757682 B1 KR101757682 B1 KR 101757682B1 KR 1020160003021 A KR1020160003021 A KR 1020160003021A KR 20160003021 A KR20160003021 A KR 20160003021A KR 101757682 B1 KR101757682 B1 KR 101757682B1
Authority
KR
South Korea
Prior art keywords
image
security
specific object
edge
intersection
Prior art date
Application number
KR1020160003021A
Other languages
Korean (ko)
Inventor
홍순곤
Original Assignee
주식회사 슈니드
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 슈니드 filed Critical 주식회사 슈니드
Priority to KR1020160003021A priority Critical patent/KR101757682B1/en
Application granted granted Critical
Publication of KR101757682B1 publication Critical patent/KR101757682B1/en

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19663Surveillance related processing done local to the camera
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19665Details related to the storage of video surveillance data
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface
    • G08B13/19682Graphic User Interface [GUI] presenting system data to the user, e.g. information on a screen helping a user interacting with an alarm system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface
    • G08B13/19686Interfaces masking personal details for privacy, e.g. blurring faces, vehicle license plates

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Theoretical Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The present invention provides a method and system for preventing external leakage of an image requiring security. The present invention discloses a technique for determining whether there is an item (for example, a specific image) to be secured in a photographed image using an algorithm. The image security according to the present invention is based on the premise that a video call is made in a photographable area, and in order to determine a security object in the captured image, a gaussian blurring pre-processing for strong edge detection, a blurring pre- , It is possible to precisely judge the security target by sequentially detecting the edges as line segments, extracting the closed edges of the detected edges, extracting straight edges, estimating the intersections (line intersections) of the outlines and straight lines, generating the vector of segments and filtering the intersections. .

Description

[0001] The present invention relates to a method and system for preventing external leakage of a security image,

The present invention relates to a method and system for preventing external leakage of a secure image.

More specifically, the present invention relates to a video security method for judging whether a captured image includes a security target and a more specific security target image (for example, a specific object) is included in the security target, .

Recently, due to the proliferation of smartphones, vulnerabilities have appeared in information security such as personal information leakage accidents and financial security accidents. Various security systems have been developed to prevent such information security.

In the case of a general video call security device, when facial image is recognized and there is a facial output disturbance element, a method of blocking image information or blocking the system device is used.

However, in the case of using an existing video communication device to communicate with the outside, when the security related objects such as confidential documents, firearms, and weapons are photographed, the image may be leaked to the outside, .

In other words, since the image security system uses the face recognition method in general, there is no problem in using it for an immigration control station, a financial institution, or a device using facial recognition for identification of the user. However, when a video call is made at a specific place, When a video call is made in a place where security is required, a security setting for a specific object is insufficient, and a video of a confidential document, a gun, a weapon, or a specific object related to security can be transmitted to the outside.

Korean Patent Registration No. B1 10-0967718 (Jun. 25, 2010)

SUMMARY OF THE INVENTION The present invention has been made to solve the above-mentioned problems in the prior art, and it is an object of the present invention to provide an image- Or replacing the image with another image stored in advance, and to provide a system and a method for preventing the leakage of the security image.

It is another object of the present invention to provide a security information management system and a security information management system in which when a security object including a specific object is photographed, user information and location information are notified to a specific organization or a security inspector, And to provide a system and method for preventing leakage.

Other objects of the present invention will be apparent from the following description.

According to another aspect of the present invention, there is provided a method for preventing external leakage of a security image, the method comprising: performing a video call in a photographable area; determining whether a specific object is included in the security- A method for preventing external leakage of a security image to be prevented, the security object recognition comprising: a first step of inputting a photographed image; A second step of performing a Gaussian blurring preprocessing for strong edge detection in an input image; A third step of detecting an edge as a line segment component in the blurring pre-processed image; A fourth step of extracting a closed section outline of the detected edge; A fifth step of extracting a straight edge; A sixth step of estimating an intersection (line segment intersection) of an outline and a straight line; And a seventh step of filtering the intersection points. The intersection points where the line segments of the line segment intersect are detected. When the intersection angle is within a predetermined angle, the outline of the candidate line is selected as the outline of the candidate line. It is finally determined that there is a security violation when the sum of the lengths of line segments based on the intersection point is equal to or larger than a predetermined size based on the horizontal width of the image and the total number of intersections is equal to or less than a predetermined number .

The intersection angle is 40 ° to 50 ° or 80 ° to 100 °, and the sum of the lengths of the line segments based on the intersection point is 70% or more of the horizontal width standard of the image, and the total number of intersections is 6.

The third step is characterized by obtaining an edge image which changes from white to black or from black to white in the blurred image.

In the fourth step, an outline corresponding to a closed section having a cycle (connected to and returning to the starting point) is extracted from eight adjacent edges of the edge, and if there is at least two 90 ° inflection points with respect to the detected closed section, And judges it as a security target.

Step 7 is a step for correcting a case where a line segment is lost, and is characterized by generating a line segment vector that traverses the entire image through fitting with respect to the advancing angle direction of the straight edge extracted at the straight line edge extracting step.

In step 7, the image is characterized by generating a segment vector that traverses the height in the case of vertical and the width in the case of horizontal.

According to an aspect of the present invention, there is provided an apparatus for preventing external leakage of a security image, the apparatus including a security object recognition algorithm and a security program including a specific object, An image security device including an image security terminal for blocking transmission of the image or replacing the image with another image stored in advance when the captured security object includes a specific object; And a server for transmitting an image of a security object transmitted from the image security means to a specific organization or a security inspector and for updating a security object image including a specific object by accessing the image security means at a remote place, And the image security means is equipped with a security object recognition algorithm and a security program. When the image of a specific object included in the photographed image of the security object coincides with the image of a specific object stored in the memory, A central processing unit which periodically replaces the user ID and the position data with the other image or intercepts the video transmission of the security target, and transmits the user ID and the position data to the server; A camera for capturing an image and inputting the captured image to the central processing unit; An audio processing unit for processing audio included in an image photographed by the camera; A memory for storing an image of a specific object included in the security object judged by the central processing unit; And a network transmission unit for transmitting a security object image including a specific object determined by the central processing unit to a server, receiving a security object image including a specific object to be updated from the server, and transmitting the image to the central processing unit .

The image security means includes a first step of inputting a photographed image; A second step of performing a Gaussian blurring preprocessing for strong edge detection in an input image; A third step of detecting an edge as a line segment component in the blurring pre-processed image; A fourth step of extracting a closed section outline of the detected edge; A fifth step of extracting a straight edge; A sixth step of estimating an intersection (line segment intersection) of an outline and a straight line; And a seventh step of filtering the intersection points. When the crossing points at which the line segments of the line segment vectors intersect are detected and the crossing angle is within the range of 40 ° to 50 ° or 80 ° to 100 °, And when the sum of the lengths of line segments based on the intersection points of the result of the line segment intersection and the candidates of the security target of the corrected segment vector is larger than 70% of the width of the image and the total number of intersections is 6 or less, And finally determines that there is a security violation.

The server is characterized in that, when a video image of a security target containing a specific object is received from the video security means, the server transmits the video image, user ID and location information including the specific object to a specific institution or security inspector .

The server checks the status of the image security means at a remote location, and when the network communication is enabled as an idle mode, the server transmits an image of a security object including a specific object to the image security means and updates the image.

According to the method and system for preventing the outflow of the security image of the present invention, a security object including specific objects such as confidential documents, firearms, and weapons, among the video calls performed in places requiring security, , It is possible to precisely judge the security target by using an algorithm to prevent external leakage and to transmit user information and location information to a specific organization or a security inspector so as to promptly cope with the leakage situation of security information It has excellent effect.

1 is a network configuration diagram of a video security system according to an embodiment of the present invention;
2 is a configuration diagram of a video security terminal according to an embodiment of the present invention;
3 is an illustration of a specific object included in a security object according to an embodiment of the present invention.
4 is a flowchart illustrating an operation of determining a security object including a specific object according to an embodiment of the present invention.
FIG. 5 is a detailed flowchart of the security object determination of FIG. 4;
6 is an operational flowchart for updating an image of a security object including a specific object in the embodiment of the present invention.

Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.

Unless defined otherwise, all terms used herein, including technical or scientific terms, have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Terms such as those defined in commonly used dictionaries should be interpreted as having a meaning consistent with the meaning in the context of the relevant art and are to be interpreted in an ideal or overly formal sense unless explicitly defined in the present application Do not.

It should be understood that the present invention covers all modifications, equivalents, and alternatives falling within the spirit and scope of the present invention as defined by the appended claims.

In the embodiment of the present invention, a case in which a video call proceeds in a secure area will be described as an example. In the following description, the terms "image" and "image" are used.

1 is a network configuration diagram of a video security system according to an embodiment of the present invention.

1, the image security system of the present invention includes a video security terminal 100, an image storage server 200, a registration server 300, and a terminal 400 such as a computer.

In one embodiment, the image security terminal 100 may include a security object determination algorithm and a security program, which include a specific object, and may be configured such that when a security object including a specific object is captured Recognizes it, and blocks transmission to the outside or substitutes it with another image stored in advance.

The configuration of the image security terminal 100 is shown in FIG.

The image security terminal 100 includes a central processing unit 110, a storage unit 120, an input unit 130, an audio processing unit 140, a display unit 150, and a network transmission unit 160.

 In one embodiment, the central processing unit 110 compares an image including a specific object photographed during a video call with a specific object stored and managed in a specific region provided with the camera, And transmits the user ID and the position data using the video call to the video storage server 200. The user ID and the position data are transmitted to the video storage server 200. [

In one embodiment, the storage unit 120 is a means for storing an image of a security object including a specific object in advance, and for storing an algorithm and a security program.

In one embodiment, the input unit 130 has a camera function to photograph a video call situation in a specific area, and input the photographed image to the central processing unit 110.

In one embodiment, the audio processing unit 140 is means for processing audio included in the photographed image.

In one embodiment, the display unit 150 is a means for visually displaying a user menu, a message, an image photographed from the input unit 130, and the like.

In one embodiment, the network transmission unit 160 is a unit for transmitting data such as user information and location information, which are captured and input by the input unit 130, to the image storage server 200.

The network transmission unit 160 is implemented in a wired / wireless communication manner and includes an interface for accessing the wireless Internet or the wired Internet.

Referring back to FIG. 1, the image storage server 200 in the exemplary embodiment of the present invention transmits an image of a security object including a specific object transmitted through the wired / wireless network to the image security terminal 100, And transmits the image of the security object including the specific object to the image security terminal 100 at a remote place to update the image.

The image storage server 200 receives and stores user ID, device information, and location information at the beginning of a call from the image security terminal 100, and receives an image of a security object including a specific object from the image security terminal 100 If received, the image, user ID and location information of the security target can be delivered to a specific authority or security inspector.

In one embodiment, the registration server 300 is connected to the image security terminal 100 through the wired / wireless network and registers the images with the image storage server 300, for example, Lt; / RTI >

In an exemplary embodiment, a terminal 400 such as a computer receives means for receiving a security object including a specific object from the image transmitted from the image security terminal 100 from the image storage server 200, For example, a special authority or a security inspector.

The operation flow of the image security system according to the present invention will be described in detail with reference to FIGS. 3 to 6. FIG.

First, an operation flow according to security object recognition in the embodiment of the present invention will be described with reference to FIG.

First, when the user attempts to make a call from the video call terminal 100, the central processing unit 110 displays a user authentication screen on the display unit 150 for user authentication (S10).

Accordingly, if the user inputs the user ID on the user authentication screen and succeeds in authentication, the central processing unit 110 obtains the device information and the position information (S20, S70), and transmits the information to the image storage server 200 (S80).

Then, the central processing unit 110 compares the image captured and input by the input unit 130 with the image of the security object stored in advance in the storage unit 120 (S40, S50 ). That is, for example, the security target image including the specific object image is compared with the security target image stored in advance in the storage unit 120.

The security object recognition (S40) including the specific object is implemented through the detailed operation flow shown in FIG.

Especially in the security object recognition operation, paper detection that can be a security target will be described as an example.

First, we estimate quadrilateral paper based on segment analysis.

5 is a quadrangular detection method based on the intersection angles of line segments by inferring the intersection point (ignoring break) between the outline of the closed section and the straight line in the user image.

First, when a photographed image is input in the input unit 130 (S10), a gaussian blurring preprocessing for strong edge detection is performed on the input image (S20). Here, blurring refers to a phenomenon in which, for example, the camera moves or the image becomes unclear due to other reasons during photographing, so blurring is preferably applied ten times in order to detect the highest contrast area.

An edge, which is a line component, is detected in the blurred image (S30).

This step is to obtain an edge image that changes from white to black or from black to white in the blurred image, and is a step for detecting an area irrelevant to the paper color like a character.

The outline of the closed section of the detected edge is extracted (S40).

This step extracts an outline corresponding to a closed section with a cycle (connected to and returning to the starting point) out of eight edge neighboring edges of the edge. If there is at least two 90 ° inflection points for the detected closed interval, it is determined that the specific form of the security target can be derived to some extent and the security target is immediately determined.

Next, the straight edge is extracted (S50).

This step is to select only the edge of the straight line without the inflection point from the obtained edge when there is no square closed interval outline.

Next, an intersection (line segment intersection) of the outline and the straight line is estimated (S60).

In this step, an intersection at which a line segment intersects the straight lines detected in step S40 is detected, and when the intersection angle is within a predetermined angle range, preferably within a range of 40 to 50 degrees or 80 to 100 degrees, As shown in FIG.

Next, segment vector generation and intersection points are filtered (S70, S80).

These steps are steps for correcting the disappearance of the line segment, and the entire image (the height in the case of the vertical direction and the case of the horizontal direction in the case of the horizontal direction, Quot; width ").

If the intersection angle is within the range of 40 ° to 50 ° or 80 ° to 100 °, it is selected as the outline of the candidate of the security target candidate, and the result of the line intersection at step S 5 And the corrected candidate segment vector of the corrected segment vector, when the sum of the lengths of the segments based on the intersection point is equal to or larger than 70% of the width of the image and the total number of intersections is 6 or less, a security violation exists .

After the security object recognition process is completed, if the image photographed during the video call is recognized as a security object and a specific object (for example, FIG. 3) is included in the security object such as the paper If the determination is made, the central processing unit 110 replaces the image with another image or blocks the image transmission (S60) instead of transmitting the image to the outside.

In addition, the central processing unit 110 transmits the image to the image storage server 200 (S90) as it is confirmed that a specific object is included in the security object, and simultaneously transmits the user ID and the position information By periodically transmitting to the video storage server 200 in a wired or wireless manner, accurate security leakage positions and images are provided to security personnel so that immediate measures can be taken.

The image storage server 200 stores an image transmitted from the image security terminal 100 and transmits the image to a terminal 400 such as a computer to be transmitted to a special institution or a security inspector.

Accordingly, the special agency or security inspector analyzes whether the image transmitted from the image storage server 200 is a security target image including specific objects such as confidential documents, guns, weapons, etc., If it is judged to be an image, a security measure corresponding thereto is quickly performed to prevent leakage of security-related information.

As described above, according to the present invention, when a security object including an image of a specific object stored in advance is photographed, it can be replaced with another image, or the leakage of security information can be prevented by blocking the image transmission. If the present invention is employed in a place such as a special institution, a military unit or a police station requiring security, leakage of security information can be prevented in advance.

On the other hand, since the specific objects included in the security target vary depending on the organization or the individual, the objects to be compared should be renewable directly or through a wireless network or a wired network.

In the meantime, the present invention can be performed at a remote place to block external transmission of a security target image including a specific object stored in the image security terminal 100 and replace it with another image, which will be described with reference to FIG.

First, the image storage server 200 checks the status of the image security terminal 100 to check whether the power is on or off and whether a network communication is available (S10).

If it is determined that the video security terminal 100 is powered on and network communication is enabled, the video storage server 200 determines whether the video security terminal 100 is busy (S20) or idle mode (S30) Check.

When the image security terminal 100 is in the idle mode, the image storage server 200 transmits a security target image including a specific object to the image security terminal 100.

The image security terminal 100 checks the storage unit 120 as a memory at step S40 and transmits the image data stored in the storage unit 120 as a security object image transmitted from the image storage server 200 and containing a specific object (S60), and this updating operation is repeated until updating of the related image is completed.

When the update operation for the image of the security object including the specific object is completed, the image security terminal 100 transmits to the image storage server 200 that the update operation is completed.

Therefore, according to the present invention, when applied to a public institution or a special institution requiring security, it is possible to prevent an image of a specific object included in a security target from being leaked to the outside during a video call. In particular, The image of the object can be updated and the reliability of the security system can be improved.

In addition, according to the present invention, when applied to a public institution or a special institution requiring security, it is possible to prevent a security target image including a specific object from being leaked to the outside during a video call. In particular, The reliability of the security system can be improved.

100: video security terminal 200: video storage server
300: registration server 400: terminal

Claims (10)

A method for preventing external leakage of a security image, the security communication method comprising the steps of: determining whether a security object image is included in a captured image,
The security object recognition may include:
A first step of inputting a photographed image;
A second step of performing Gaussian blurring pre-processing for strong edge detection in the input image;
A third step of detecting an edge as a line segment component in the blurring pre-processed image;
A fourth step of extracting a closed section outline of the detected edge;
A fifth step of extracting a straight edge;
A sixth step of estimating an intersection (line segment intersection) of an outline and a straight line;
And a seventh step of generating a segment vector and filtering the intersection points,
The crossing point at which the line segments of the segment vector intersect is detected, and when the crossing angle is within a predetermined angle, the line is selected as the outline of the security target candidate group, When the sum of the lengths of the segments is equal to or larger than a predetermined size based on the width of the image and the number of the total intersections is equal to or less than a predetermined number, a final determination is made that a security violation exists.
The method according to claim 1, wherein the intersection angle is 40 to 50 degrees or 80 to 100 degrees, the sum of the lengths of the line segments based on the intersection point is not less than 70% 6 < / RTI > The method of claim 1, wherein the third step is to acquire an edge image that changes from white to black or from black to white in the blurred image, respectively. The method of claim 1, wherein the fourth step
If the edge of a closed section with a cycle (connected back to the starting point) among the eight edges neighboring edges of the edge is extracted and there are at least two 90 ° inflection points for the detected closed section, Wherein the secure image is protected from external leakage.
2. The method of claim 1, wherein the step
And generating a segment vector that traverses the entire image through fitting of the straight edge extracted in the straight edge extraction step to the progress angle direction, How to prevent spills.
6. The method of claim 5, wherein the image is generated as a line segment that crosses the height in the vertical direction and the width in the horizontal direction. A security object recognizing algorithm and a security program including a specific object are mounted and a security target image containing a specific object is stored and managed in advance. When a security object includes a specific object, transmission of the image is blocked An image security device including an image security terminal for replacing the image with another image stored in advance; And
A server for transmitting a security target image transmitted from the image security means to a specific organization or a security inspector and for updating a security target image including a specific object by accessing the image security means at a remote place, Lt; / RTI >
Wherein the image security means comprises:
A security object recognition algorithm and a security program are installed. When the image of a specific object included in the captured image of the secured object coincides with the image of a specific object stored in the memory, the image of the object of security is replaced with another image, A central processing unit that intercepts video transmission and periodically transmits user ID and location data to a server;
A camera for capturing an image and inputting the captured image to the central processing unit;
An audio processing unit for processing audio included in an image photographed by the camera;
A memory for storing an image of a specific object included in the security object determined by the central processing unit; And
A network transmission unit for transmitting a security target image including a specific object determined by the central processing unit to a server, receiving a security target image including a specific object to be updated from the server and transmitting the image to the central processing unit, Wherein the secure image is protected from external leakage.
8. The apparatus of claim 7, wherein the image security means
A first step of inputting a photographed image;
A second step of performing Gaussian blurring pre-processing for strong edge detection in the input image;
A third step of detecting an edge as a line segment component in the blurring pre-processed image;
A fourth step of extracting a closed section outline of the detected edge;
A fifth step of extracting a straight edge;
A sixth step of estimating an intersection (line segment intersection) of an outline and a straight line;
And a seventh step of generating a segment vector and filtering the intersection points,
If the crossing point at which the line segments of the segment vector intersect is detected and the crossing angle is within 40 ° to 50 ° or 80 ° to 100 °, it is selected as the outline of the candidate for security target, and the result of the line intersection and the corrected line segment vector Characterized in that, when the sum of the lengths of line segments on the basis of the intersection point is greater than or equal to 70% of the horizontal width of the image and the total number of intersections is equal to or less than 6, A system to prevent the outflow of images.
8. The method of claim 7, wherein the server
A secure object image, a user ID, and location information including the specific object are transmitted to a specific organization or a security inspector when a secure object image including a specific object is received from the image security means, A system to prevent outflow.
8. The method of claim 7, wherein the server
Wherein the image security unit checks the status of the image security unit at a remote location and transmits a security object image containing a specific object to the image security unit when the network communication is enabled as the idle mode. system.
KR1020160003021A 2016-01-11 2016-01-11 Outside diversion preventing method of security image and system therof KR101757682B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020160003021A KR101757682B1 (en) 2016-01-11 2016-01-11 Outside diversion preventing method of security image and system therof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020160003021A KR101757682B1 (en) 2016-01-11 2016-01-11 Outside diversion preventing method of security image and system therof

Publications (1)

Publication Number Publication Date
KR101757682B1 true KR101757682B1 (en) 2017-07-13

Family

ID=59352459

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020160003021A KR101757682B1 (en) 2016-01-11 2016-01-11 Outside diversion preventing method of security image and system therof

Country Status (1)

Country Link
KR (1) KR101757682B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101946579B1 (en) * 2018-10-19 2019-05-21 (주)동광지엔티 System For Drawing Of Renewal Area
KR101946573B1 (en) * 2018-10-24 2019-05-21 (주)동광지엔티 Equipment For Drawing Image

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100785339B1 (en) 2006-11-16 2007-12-17 중앙대학교 산학협력단 Apparatus and method for recognizing shape from an image
KR101277322B1 (en) 2010-11-08 2013-06-20 주식회사 원포유 Video communication apparatus and real time face recognition video communication method thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100785339B1 (en) 2006-11-16 2007-12-17 중앙대학교 산학협력단 Apparatus and method for recognizing shape from an image
KR101277322B1 (en) 2010-11-08 2013-06-20 주식회사 원포유 Video communication apparatus and real time face recognition video communication method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101946579B1 (en) * 2018-10-19 2019-05-21 (주)동광지엔티 System For Drawing Of Renewal Area
KR101946573B1 (en) * 2018-10-24 2019-05-21 (주)동광지엔티 Equipment For Drawing Image

Similar Documents

Publication Publication Date Title
JP7159509B1 (en) Systems and methods using multiple focal stacks for image-based spoofing detection
US11321575B2 (en) Method, apparatus and system for liveness detection, electronic device, and storage medium
CN109002786B (en) Face detection method, face detection equipment and computer-readable storage medium
US20180012094A1 (en) Spoofing attack detection during live image capture
CN104834866A (en) Method and device for protecting privacy-sensitive information by automatically recognizing scene
KR101057882B1 (en) Wanted-vehicle and illegal parking crackdown system
KR102406804B1 (en) Method and system for automatically detecting objects in image based on deep learning
US10991292B2 (en) System and method for protecting sensitive on-screen information
CN113012383B (en) Fire detection alarm method, related system, related equipment and storage medium
CN104834839A (en) Bar code generating method, authentication method based on bar code and relative terminal
CN109902611B (en) Target certificate detection method and device and terminal equipment
CN107294915A (en) Image-pickup method, system and terminal
CN110619239A (en) Application interface processing method and device, storage medium and terminal
KR101757682B1 (en) Outside diversion preventing method of security image and system therof
US9197851B2 (en) Apparatus and method for modulating images for videotelephony
US10299117B2 (en) Method for authenticating a mobile device and establishing a direct mirroring connection between the authenticated mobile device and a target screen device
CN108334761B (en) User authority identification method and device
KR101654797B1 (en) Interactive CAPTCHA System Resilient to Phishing Attacks
KR101925799B1 (en) Computer program for preventing information spill displayed on display device and security service using the same
CN108063665B (en) Communication method and terminal device
CN110135204A (en) Data guard method and device
CN112906651B (en) Target detection method and device
CN110134565A (en) Environment light detection method and device
CN110084076A (en) Evidence display methods and device
KR101736095B1 (en) Outside diversion preventing method of security image and system thereof

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant