Visual surveillance systems are increasingly common in our society today. There is a conflict between the demands for security of the public and the demands to preserve the personal integrity. This thesis suggests a solution in which parts of the surveillance images are covered in order to conceal the identities of persons appearing in video, but not their actions or activities. The covered parts could be encrypted and unlocked only by the police or another legal authority in case of a crime. This thesis implements a proof-of-concept demonstrator using a combination of image processing techniques such as foreground segmentation, mathematical morphology, geometric camera calibration and region tracking. The demonstrator is capable of trackin...
Nowadays, safety and security of public areas has become the centre of attention, and especially aft...
This article proposes new tools to detect the tampering of video feeds from surveillance cameras. Ou...
Security is a fundamental issue in today's world. In this chapter we discuss various aspects of secu...
International usage and interest in Closed-Circuit Television (CCTV) for surveil-lance of public spa...
Part 3: FuturesInternational audienceVideo surveillance is an omnipresent phenomenon in today’s metr...
Recent widespread deployment and increased sophistication of video surveillance systems have raised ...
We present in this paper a method for de-identification of persons in a CCTV environment which uses ...
The move from analog to fully digital systems in conjunction with continuous technological advances ...
In the context of sharing video surveillance data, a significant threat to privacy is face recogniti...
Visual surveillance in dynamic scenes, especially for human activities, is one of the current challe...
The use of CCTV surveillance is today’s need inpublic and private sector for ensuring security again...
The aim of this thesis is to leverage machine learning algorithms to introduce adversarial cloaks, o...
AbstractToday, there are millions of surveillance cameras monitoring and recording day to day activi...
In the context of sharing video surveillance data, a significant threat to privacy is face recogni...
Abstract—In the context of sharing video surveillance data, a significant threat to privacy is face ...
Nowadays, safety and security of public areas has become the centre of attention, and especially aft...
This article proposes new tools to detect the tampering of video feeds from surveillance cameras. Ou...
Security is a fundamental issue in today's world. In this chapter we discuss various aspects of secu...
International usage and interest in Closed-Circuit Television (CCTV) for surveil-lance of public spa...
Part 3: FuturesInternational audienceVideo surveillance is an omnipresent phenomenon in today’s metr...
Recent widespread deployment and increased sophistication of video surveillance systems have raised ...
We present in this paper a method for de-identification of persons in a CCTV environment which uses ...
The move from analog to fully digital systems in conjunction with continuous technological advances ...
In the context of sharing video surveillance data, a significant threat to privacy is face recogniti...
Visual surveillance in dynamic scenes, especially for human activities, is one of the current challe...
The use of CCTV surveillance is today’s need inpublic and private sector for ensuring security again...
The aim of this thesis is to leverage machine learning algorithms to introduce adversarial cloaks, o...
AbstractToday, there are millions of surveillance cameras monitoring and recording day to day activi...
In the context of sharing video surveillance data, a significant threat to privacy is face recogni...
Abstract—In the context of sharing video surveillance data, a significant threat to privacy is face ...
Nowadays, safety and security of public areas has become the centre of attention, and especially aft...
This article proposes new tools to detect the tampering of video feeds from surveillance cameras. Ou...
Security is a fundamental issue in today's world. In this chapter we discuss various aspects of secu...