Validate Privacy Constraints in Surveillance Systems

نویسندگان

  • László Havasi
  • Zoltán Szlávik
  • Levente Kovács
  • Ákos Utasi
  • Csaba Benedek
  • Tamás Szirányi
چکیده

The paper introduces a video surveillance and event detection framework and application for semi-supervised surveillance use. The system development follows the guidelines of national strategy for surveillance systems. The aim is to generalize the interoperability, compatibility and legality in camera surveillance systems in Hungary. The system’s intended use is in automatic mode on camera feeds that are not actively watched by surveillance personnel, and should raise alarms when unusual events occur. We present the current detector filters, and the extendable modular interface. Filters include local and global unusual motion detectors, left/stolen object detector, motion detector, tampering/failure detector, etc. It has been tested in real life situation for police street surveillance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-Respecting Smart Video Surveillance Based on Usage Control Enforcement

The number of video surveillance deployments in publicly accessible spaces is continuously increasing. At the same time, the call for technical assistance of human operators in terms of so-called smart video surveillance system has been growing ever louder and is addressed by research and development. With such systems, video analysis algorithms for activity recognition, tracking, and biometric...

متن کامل

Addressing Early Life Cycle Privacy Risk

This paper adapts System-Theoretic Early Concept Analysis (STECA), an instrumental safety risk management technique, for privacy to better identify and address privacy risks early in the engineering process. The technique, STECAPriv, aims to infer a nominal functional privacy control structure based on a conceptual system description and privacy-related system behavioral constraints. Model-base...

متن کامل

Photorealistic Face De-Identification by Aggregating Donors' Face Components

With the adoption of pervasive surveillance systems and the development of efficient automatic face matchers, the question of preserving privacy becomes paramount. In this context, automated face de-identification is revived. Typical solutions based on eyes masking or pixelization, while commonly used in news broadcasts, produce very unnatural images. More sophisticated solutions were sparingly...

متن کامل

Adding Privacy Constraints to Video-Based Applications

Remote accessibility to video cameras, face recognition software, and searchable image and video databases enable automated video surveillance. The same technologies and features enabling advanced functionalities facilitate as well the misuse of a surveillance system and can lead to the infringement of the privacy of an individual. Examples of misuse are voyeurism and the unauthorized collectio...

متن کامل

User-Centric Protection and Privacy in Smart Surveillance Systems

During the last decades surveillance systems developed from analog one camera one monitor systems to highly complex distributed systems with heterogeneous sensors that can handle surveillance tasks autonomously. With raising power and complexity, ensuring privacy became a key challenge. An event-driven SOA architecture that follows the privacy by design principle is a promising approach to real...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010