Privacy and Security Not Seeing the Crime for the Cameras?
نویسنده
چکیده
I n TErMS OF sales, remote surveillance camera systems—commonly known as closed-circuit television (CCTV)—are a huge success story. Billons of dollars are spent on CCTV schemes by governments in developed countries each year, and sales to commercial companies and home users have been increasing, too. CCTV can be used for many purposes— ranging from monitoring traffic flows on highways, to allowing visitors in zoos to observe newborn animals during their first few days without disturbing them. The vast majority of CCTV purchases are made with the aim of improving safety and security. The London Underground was the first public transport operator to install cameras on station platforms, so train drivers could check doors were clear before closing them. CCTV has come a long way since then: last summer, the technology writer Cory Doctorow noticed that a single London bus now has 16 cameras on it (see Figure 1). The advance from analog to digital technology had a major impact on CCTV: cameras are much smaller and cheaper, video is often transmitted wirelessly, and recordings are stored on hard disks, rather than tapes. Integration with other digital technologies offers further possibilities: image processing makes it possible to recognize automobile license plates automatically and match them against databases to check if a vehicle has been reported as stolen, or is uninsured. Advances in hardware—such as high-definition cameras—and image processing—such as the ability to process face and iris information from images taken at a distance, not detecting unattended objects—will enable a wide range of possible technology solutions (imagine the whole industry salivating). The burgeoning sales figures and ubiquity of cameras suggest that surely CCTV technology must be effective. The U.K. government has invested heavily in CCTV over the past 15 years, making it the country with the highest CCTV camera-to-person ratio on earth (Greater London alone has one camera for every six citizens). A key driver for adoption was that local authorities seeking to combat crime could obtain government funds to purchase CCTV. In the public debate, this policy has been justified mainly with two arguments: “the public wants it,” and “surely it’s obvious that it works.” As evidence for the latter, policymakers often point to high-profile (and often highly emotionally charged) cases: In 1993, CCTV images from a shop ˲ ping mall camera showed police investigators that the murdered toddler James Bulger had been abducted by two teenagers, who were then apprehended and convicted. Images from London Transport ˲ privacy and Security not Seeing the Crime for the Cameras?
منابع مشابه
overview of ways to enhance the security of video surveillance networks using blockchain
In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...
متن کاملNew Concept Regarding Management of Security Cameras
We propose a new concept regarding the management of security cameras in which those who own and manage images (the owner) and those who have the right to view the images (the viewer) are separated by means of the encryption of the images. Using this concept, encrypted images are transferred from the owner to the viewer only when both the owner and the viewer consider it necessary, such as in t...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کامل