Guest Editorial: Special issue on intelligent video surveillance for public security and personal privacy
نویسندگان
چکیده
O VER the past decade, video surveillance has rapidly become a widespread tool for public security. However, with the increasing volume of surveillance data, traditional manual monitoring suffers from human errors and potentially considerable delays in decision making. Moreover, there is an increasing concern of invasion of personal privacy as people's whereabouts and activities are recorded and stored by video surveillance systems. To address the concerns of public security and privacy, it is desirable to design new cloud and distributed computing systems for data recording, archival, indexing, and manipulation that enable achieving the potentially contradicting goals of effective surveillance and preservation of the privacy of individuals. Driven by such a vision, the intelligent video surveillance (IVS) technology is the core of the emerging next-generation video surveillance system. Recent advances in computer vision have shown good potential for many tasks, such as object detection, human identification , tracking, and behavior understanding. The success of these technologies promotes the fast growth of applied industrial IVS systems in diverse security applications for crime prevention and counterterrorism. In addition, research on security and privacy issues in video surveillance has been growing in recent years. New interdisciplinary technologies that integrate computer vision, data hiding, and stenography have been developed to address privacy protection concerns. The codevelop-ment of security technology and privacy protection is essential to the healthy growth of intelligent video surveillance, and its acceptance by the general public. This Special Issue offers an overview of ongoing research on IVS techniques, and brings together cutting-edge research work on security and privacy problems with respect to technological, behavioral, legal, and cultural aspects. We received 34 submissions and each submission was rigorously reviewed by at least two experts in the related fields based on the criteria of originality , significance, quality, and clarity. Eventually, 12 papers were accepted for the Special Issue, spanning a variety of topics including privacy protection, background modeling, tracking, action/activity analysis, and crowd behavior perception. In IVS, two key factors which hinder scalability are the time spent in decompressing the input video streams and the limited computational power of the processing unit. The contribution by Popa et al. (" Hardware Acceleration of Background Mod-eling in the Compressed Domain ") demonstrates how a combination of algorithmic and hardware techniques can overcome these limitations, and significantly increase the number of simultaneous streams. The work explores the effects of reducing the number of coefficients in the …
منابع مشابه
Guest Editorial: Impact of Integrated Intelligent Information and Analytical Systems on Society
The Special Issue of the Journal of Information Technology Management (JITM) is publishing very selective papers on information management, technology in higher education, integrated systems, enterprise management, cultural thoughts, strategic contributions, management information systems, and cloud computing. We received numerous papers for this special issue but after an extensive pe...
متن کاملA Sudy on Information Privacy Issue on Social Networks
In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...
متن کاملEditorial: special issue on advances in security and privacy for future mobile communications
Without doubt, the advances in wireless communication technologies like 3G, WiFi, WiMax and the proliferation of mobile devices have enabled the realization of pervasive and intelligent environments for users to communicate with each other, interact with information processing devices, and acquire ubiquitously a plethora of mobile services through various types of wireless access networks. Unde...
متن کاملGuest Editorial: Special issue on privacy and trust management in cloud and distributed systems
W ITH the continuous drive towards availability of data and services anytime anywhere, privacy risks have significantly increased. We are now witnessing vast amounts of privacy-sensitive data being collected, sometimes unintentionally, in a myriad of different types of networks. Unauthorized disclosure, modification, usage, or denial of access to these data may result in high human and financia...
متن کاملoverview of ways to enhance the security of video surveillance networks using blockchain
In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Trans. Information Forensics and Security
دوره 8 شماره
صفحات -
تاریخ انتشار 2013