Validate Privacy Constraints in Surveillance Systems
نویسندگان
چکیده
The paper introduces a video surveillance and event detection framework and application for semi-supervised surveillance use. The system development follows the guidelines of national strategy for surveillance systems. The aim is to generalize the interoperability, compatibility and legality in camera surveillance systems in Hungary. The system’s intended use is in automatic mode on camera feeds that are not actively watched by surveillance personnel, and should raise alarms when unusual events occur. We present the current detector filters, and the extendable modular interface. Filters include local and global unusual motion detectors, left/stolen object detector, motion detector, tampering/failure detector, etc. It has been tested in real life situation for police street surveillance.
منابع مشابه
Privacy-Respecting Smart Video Surveillance Based on Usage Control Enforcement
The number of video surveillance deployments in publicly accessible spaces is continuously increasing. At the same time, the call for technical assistance of human operators in terms of so-called smart video surveillance system has been growing ever louder and is addressed by research and development. With such systems, video analysis algorithms for activity recognition, tracking, and biometric...
متن کاملAddressing Early Life Cycle Privacy Risk
This paper adapts System-Theoretic Early Concept Analysis (STECA), an instrumental safety risk management technique, for privacy to better identify and address privacy risks early in the engineering process. The technique, STECAPriv, aims to infer a nominal functional privacy control structure based on a conceptual system description and privacy-related system behavioral constraints. Model-base...
متن کاملPhotorealistic Face De-Identification by Aggregating Donors' Face Components
With the adoption of pervasive surveillance systems and the development of efficient automatic face matchers, the question of preserving privacy becomes paramount. In this context, automated face de-identification is revived. Typical solutions based on eyes masking or pixelization, while commonly used in news broadcasts, produce very unnatural images. More sophisticated solutions were sparingly...
متن کاملAdding Privacy Constraints to Video-Based Applications
Remote accessibility to video cameras, face recognition software, and searchable image and video databases enable automated video surveillance. The same technologies and features enabling advanced functionalities facilitate as well the misuse of a surveillance system and can lead to the infringement of the privacy of an individual. Examples of misuse are voyeurism and the unauthorized collectio...
متن کاملUser-Centric Protection and Privacy in Smart Surveillance Systems
During the last decades surveillance systems developed from analog one camera one monitor systems to highly complex distributed systems with heterogeneous sensors that can handle surveillance tasks autonomously. With raising power and complexity, ensuring privacy became a key challenge. An event-driven SOA architecture that follows the privacy by design principle is a promising approach to real...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010