JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Auto Detection System of Personal Information based on Images and Document Analysis
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Auto Detection System of Personal Information based on Images and Document Analysis
Cho, Jeong-Hyun; Ahn, Cheol-Woong;
  PDF(new window)
 Abstract
This paper proposes Personal Information Auto Detection(PIAD) System to prevent leakage of Personal informations in document and image files that can be used by mobile service provider. The proposed system is to automatically detect the images and documents that contain personal informations and shows the result to the user. The PIAD is divided into the selection step for fast and accurate retrieval images and analysis which is composed of SURF, erosion and dilation, FindContours algorithm. The result of proposed PIAD system showed more than 98% accuracy by selection and analysis steps, 267 images detection of 272 images.
 Keywords
Personal Information Auto Detection(PIAD);SURF;Mobile Service Provider;
 Language
Korean
 Cited by
 References
1.
The Statics Portal, "Number of smart phones sold to end users worldwide from 2007 to 2013 (in million units)", http://www.statista.com/statistics/263437/global-smartphone-sales-to-end-users-since-2007/.

2.
Korea Internet Security Agency, "Study on Usage Patterns of Age and Gender for Smartphone Users", Internet & Security Focus, pp. 35-51, 2013.

3.
"Personal Information Loss of Mobile Service Provider", http://www.zdnet.co.kr/news/news_view.asp?artice_id=20140311154043.

4.
Korea Internet Security Agency, "Counselling Count of Personal Information Protection", http://isis.kisa.or.kr/.

5.
Ministry of Security and Public Administration, "The Personal Information Protection Act".

6.
H. Y. Hwang and N. Y. Kim, "Personal Information Protection System for Web Service", The Journal of The Institute of Internet, Broadcasting and Communication, VOL. 11, No. 6, pp. 261-266, December 2011.

7.
W. J. Kang, "An Efficient Privacy Preserving Method based on Semantic Security Policy Enforcement", The Journal of The Institute of Internet, Broadcasting and Communication, VOL. 13, No. 6, pp. 173-186, December 2013.

8.
J. K. Baek and J. P. Park, "A Study on Personal Information Control and Security in Printed Matter", Journal of Korea Academia-Industrial cooperation Society, Vol. 14, No. 5, pp. 2415-2421, 2013, crossref(new window)

9.
B. Kim, J. I. Lim, Y. H. Jo, "Privacy Situation and Countermeasures of Financial Apps based on the Android operating System", The Journal of The Institute of Internet, Broadcasting and Communication, VOL. 14, No. 6, pp. 267-272, December 2014.

10.
M. S. Seo, and D. W. Park, "The Solution for Personal Information Protection Act of PC", Journal of the Korea Institute of Information Security and Cryptology, Vol. 22, No. 8, pp. 21-25, 2012.

11.
J. H. Cho, C. W. Ahn, and J. H. Jun, "A Feature Point Tracking Method By Using Template Matching and Buffer", The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), VOL. 14, NO. 4, pp.173-179, 2014.

12.
H. J. Lee, "Character Recognition for Machine Reader Zone of Electronic Identity Card", Master's Thesis, Ajou University, 2014.

13.
S. D. Park, Y. U. Woo and G. B. Kim, "Recognition of Resident Registration Cards Using ART-1 and PCA Algorithm", Journal of Korea Institute of Information and Communication Engineering, Vol. 11, No. 9, pp. 1786-1792, 2007.

14.
R. Sankar and G. Ivkovic, "An Adaptive Image Quality Assessment Algorithm", International Journal of Advanced Smart Convergence(IJASC), Vol. 1, No. 1, pp. 6-13, 2012. crossref(new window)

15.
L. Neumann and J. Matas, "Real-Time Scene Text Localization and Recognition," the 25th IEEE Conference on Computer Vision and Pattern Recognition, pp. 3538-3545, 2012.

16.
H. Bay, T. Tuytelaars, and L. V. Gool, "Surf: Speeded up robust features," European Conference on Computer Vision, Vol. 3951, pp. 404-417, 2006.

17.
D. Lowe, "Distinctive Image Features from Scale-Invariant Keypoints," Int'l J. Computer Vision, Vol. 60, No. 2, pp. 91-110, 2004.

18.
S. Suzuki and K. Abe, "Topological structural analysis of digital binary images by border following," Computer Vision, Graphics and Image Processing, Vol. 30, pp. 32-46, 1985. crossref(new window)

19.
J. S. Kim, " A Study on V.M.D(Visual Merchandising Design) Environment of Mobile Telecommunication Company Store", Journal of the Korea Academia-Industrial cooperation Society(JKAIS), Vol. 14, No. 4, pp. 1589-1594, 2013. crossref(new window)