RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        WIPI 플랫폼 기반 얼굴인식 미들웨어 설계

        배경율,Bae, Kyoung-Yul 한국지능정보시스템학회 2005 지능정보연구 Vol.11 No.3

        Proportionately with a rapid development of mobile instrument technology, the number of mobile contents utilizing computing environment's graphic technology or image processing is increasing. In this paper, I designed a middleware which supports facial detection and recognition system based WIPI(Wireless Internet Platform for Interoperability), the Korean standard mobile platform. The facial recognition middleware introduced the object oriented concepts, to apply to recognition security and other contents by using mobile camera. This can reduce the development time and cost by dividing process while developing software. Therefore, it would be applied to content security or technology transfer with other company. Facial recognition middleware system is composed of face detection module and face recognition module, and proposes the application contents design method based on WIPI platform. 이동기기를 기반으로 하는 기술이 급격히 발달함에 따라 일반 컴퓨팅 환경의 그래픽이나 영상처리 기술들을 활용한 모바일 컨텐츠 개발이 증가하고 있다. 본 논문에서는 상호 연동성을 지원하는 국내 표준 무선인터넷 플랫폼인 WIPI를 기반으로 하여 영상처리와 얼굴인식 기술을 응용한 얼굴탐지 및 인식 지원 미들웨어를 설계하였다. 생성된 얼굴인식 미들웨어는 휴대폰 카메라를 이용한 인식보안 및 다양한 컨텐츠로 활용될 수 있도록 객체지향 개념을 도입해 각각의 미들웨어가 얼굴인식 미들웨어를 공유할 수 있다. 이는 컨텐츠 설계에 있어 주요 프로세스를 분리함으로써 컨텐츠의 개발 기간 및 비용을 단축시킬 수 있으며, 컨텐츠 보호 및 타 기업과의 기술이전에 적용될 수 있다. 얼굴인식 미들웨어는 서비스에 따라 얼굴탐지 모듈과 얼굴인식 모듈로 구성되며, WIPI 플랫폼 상에서의 얼굴인식 미들웨어 응용 컨텐츠 설계 방법에 대하여 제시한다.

      • KCI등재

        다중 지문 시퀀스를 이용한 스마트폰 보안

        배경율,Bae, Kyoung-Yul 한국지능정보시스템학회 2013 지능정보연구 Vol.19 No.3

        최근 모바일 디바이스와 휴대기기의 발달로 원격접속이 늘어남에 따라 보안의 중요성도 점차 증가되었다. 그러나 기존 패스워드나 패턴과 같은 보안 프로그램은 지나치게 단순할 뿐 아니라 다른 사용자가 쉽게 취득하여 악용할 수 있다는 단점이 있다. 생체인식을 활용한 보안 시스템은 보안성이 강화 되었지만 위조 및 변조가 가능하기 때문에 완전한 해결책을 제시하지 못한다. 본 논문에서는 이러한 문제점을 해결하기 위해 지문인식과 패스워드를 결합하여 보안성을 향상시킬 수 있는 방안을 연구하였다. 제안한 시스템은 하나의 지문이 아니라 다수의 지문을 이용하는 방법으로, 사용자가 패스워드를 입력할 때 여러 지문 중에서 정확한 지문의 순서를 제공하도록 한다. 오늘날 스마트폰은 패스워드나 패턴, 지문을 이용할 수 있지만 패스워드의 강도가 낮거나 패턴이 쉽게 노출되는 등의 문제가 있다. 반면에 제안한 시스템은 다양한 지문의 이용과 패스워드의 연계, 또는 다른 생체인식 시스템과 연결함으로써 매우 강력한 보안장치가 될 수 있다. Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after

      • 웹 서비스 환경에서의 전략적 비즈니스 서비스 트랜잭션 관리

        배경율 ( Kyoung Yul Bae ) 상명대학교 소프트웨어·미디어연구소 2004 소프트웨어 미디어연구 Vol.2004 No.2

        본 논문에서는 웹 서비스 애플리케이션의 일관성과 신뢰성을 보장하기 위한 트랜잭션 처리 방안에 대하여 기술한다. 여러 웹 서비스 표준 중에 WS-Coordination, WS-Transaction의 세부 명세와 규약을 파악하고 웹 서비스 트랜잭션 처리를 위하여 애플리케이션에 필요한 메커니즘을 살펴 본다. 또한 웹 서비스 환경에서 적용할 수 있는 두 가지 모형의 웹 서비스 트랜잭션 시나리오를 통하여 신뢰성 있는 웹 서비스 트랜잭션 처리 방안을 제시하고 확장성 있는 트랜잭션 처리를 제안한다.

      • 신뢰성 있는 웹 서비스 구현 방안

        배경율 ( Kyoung Yul Bae ) 상명대학교 소프트웨어·미디어연구소 2004 소프트웨어 미디어연구 Vol.2004 No.2

        본 논문에서는 신뢰성 있는 웹 서비스를 구현하기 위한 방안에 대해 연구한다. 그 동안 제청되어온 다수의 웹 서비스 표준을 살펴보고 그 중에서 특히 웹서비스의 신뢰성 향상을 위한 표준 분석과 이러한 표준들의 조합 가능한 방법을 살펴본다. 오늘날 웹 서비스들은 특히 XML로 인코딩된 SOAP 메시지를 처리하고 HTTP를 통해 전송되며 Web Services Description Language (WSDL)로 정의된 분산 서비스로서 광범위하게 전개되고 있다. 웹 서비스는 애플리케이션 통합 시나리오의 범주에서 사용되고 있다. 간단한 데이터 공유에서부터 대규모의 인터넷 판매 및 통화 교환까지 미친다. 이제 웹 서비스는 모바일, 디바이스, 그리드 시나리오에도 적용되고 있다. 본 논문에서는 광범위하게 전개 되고 있는 웹 서비스의 신뢰성을 향상시키기 위한 각각의 표준을 적용하여 효율적인 구현 방안을 제시하고자 한다.

      • KCI등재

        통계적 영상 품질 측정

        배경율(Kyoung Yul Bae) 한국지능정보시스템학회 2007 지능정보연구 Vol.13 No.4

        The image quality measure is an important issue in the image processing. Several methods which measure the image quality have been proposed and these are based on the mathematical point of view. However, there is difference between the mathematicalmeasure and the measure based on the human visual system and a new measure has to be proposed because the final target of the image is a human visual system In this paper, a statistical image quality measure which is considered the human visual feature was suggested. The human visual system is using the global quality of the image and the local quality of the image and the local quality is more important to human visual system. In this paper, the image divided into several segments and the image qualities were calculated respectively. After then, the statistical method using scoring was applied to the image qualities. The result of the image quality measure was similar to the result of measure based on the human visual system.

      • 웹서비스를 이용한 종합학생정보 시스템

        배경율 ( Kyoung Yul Bae ) 상명대학교 소프트웨어·미디어연구소 2004 소프트웨어 미디어연구 Vol.2004 No.1

        본 논문은 웹서비스 기반의 환경에서 종합학생정보시스템을 구성하는데 있다. 웹서비스(Web Services)는 응용프로그램들이 플랫폼과 프로그래밍 언어와는 독립된 방식으로 통신하는 기술로서 기업에서는 웹서비스를 이용하여 주로 기술통합에 따르는 문제점을 해결해 왔다. 이러한 웹서비스의 특징을 바탕으로 이기종 시스템간 정보 공유의 필요성이 높은 대학 학생정보시스템에 웹서비스 기술을 적용함으로써 시스템간의 연계와 이를 기반으로 학생들에게 초점을 둔 능동적 서비스를 제공하는 시스템을 구성하며 이로써 학생들에게 학교생활의 질적 향상을 도모하는데 목적이 있다. 또한 기존에 구축된 시스템을 웹서비스 기반으로 통합하여 효율적인 학교 전산 시스템 구축 방향을 제시하고자 한다.

      • KCI등재

        분산형 인공지능 얼굴인증 시스템의 설계 및 구현

        배경율(Kyoung-Yul Bae) 한국지능정보시스템학회 2004 지능정보연구 Vol.10 No.1

        It is notorious that PIN(Personal Identification Number) is used widely for user verification and authentication in networked environment. But, when the user Identification and password are exposed by hacking, we can be damaged monetary damage as well as invasion of privacy. In this paper, we adopt face recognition-based authentication which have nothing to worry what the ID and password will be exposed. Also, we suggest the remote authentication and verification system by considering not only 2-Tier system but also 3- Tier system getting be distributed. In this research, we analyze the face feature data using the SVM(Support Vector Machine) and PCA(Principle Component Analysis), and implement artificial intelligence face recognition module in distributed environment which increase the authentication speed and heightens accuracy by utilizing artificial intelligence techniques.

      • KCI등재

        인터넷 뱅킹의 사용자 인증을 위한 얼굴인식 시스템의 설계

        배경율(Kyoung-Yul Bae) 한국지능정보시스템학회 2003 지능정보연구 Vol.9 No.3

        In this paper, we suggest user authentication and authorization system for internet banking by face recognition. The system is one of Biometrics technology to verify and authorize personnel identification and is more unobtrusive than the other technologies, because they use physiological characteristics such as fingerprint, hand geometry, iris to their system that people have to touch it. Also, the face recognition system requires only a few devices such as a camera and keypad, so it is easy to apply it to the real world. The face recognition algorithms open to the public are separated by their analysis method differ from what characteristic of the human face use. There are PCA (Principal Component Analysis), ICA (Independent Component Analysis), FDA (Fisher Discriminant Analysis). Among these, physiological data of encrypted form is translated utilizing PCA which is the most fundamental algorithm that analyze face feature, and we suggests design method of user authentication system that can do send-receive fast and exactly.

      • KCI등재

        쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹

        배경율(Kyoung-yul Bae) 한국지능정보시스템학회 2013 지능정보연구 Vol.19 No.4

        With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court’s decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer’s losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer’s personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court’s sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer’s personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼