首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
This essay provides a matrix for use by researchers and system designers as a heuristic device to assess the likely legality of the deployment of a surveillance camera system. After presenting the matrix the essay considers examples in which smart camera technology might enhance the venues for deployment of surveillance cameras. Lastly, the article speculates about legal risks that may confront smart camera technology as it becomes more sophisticated.   相似文献   

3.
An Introduction to Distributed Smart Cameras   总被引:2,自引:0,他引:2  
Distributed smart cameras (DSCs) are real-time distributed embedded systems that perform computer vision using multiple cameras. This new approach has emerged thanks to a confluence of simultaneous advances in four key disciplines: computer vision, image sensors, embedded computing, and sensor networks. Processing images in a network of distributed smart cameras introduces several complications. However, we believe that the problems DSCs solve are much more important than the challenges of designing and building a distributed video system. We argue that distributed smart cameras represent key components for future embedded computer vision systems and that smart cameras will become an enabling technology for many new applications. We summarize smart camera technology and applications, discuss current trends, and identify important research challenges.   相似文献   

4.
5.
Security and Privacy for Distributed Multimedia Sensor Networks   总被引:1,自引:0,他引:1  
There is a critical need to provide privacy and security assurances for distributed multimedia sensor networking in applications including military surveillance and healthcare monitoring. Such guarantees enable the widespread adoption of such information systems, leading to large-scale societal benefit. To effectively address protection and reliability issues, secure communications and processing must be considered from system inception. Due to the emerging nature of broadband sensor systems, this provides fertile research ground for proposing more paradigm-shifting approaches. This paper discusses issues in designing for security and privacy in distributed multimedia sensor networks. We introduce the heterogeneous lightweight sensornets for trusted visual computing framework for distributed multimedia sensor networks. Protection issues within this architecture are analyzed, leading to the development of open research problems including secure routing in emerging free-space optical sensor networks and distributed privacy for vision-rich sensor networking. Proposed solutions to these problems are presented, demonstrating the necessary interaction among signal processing, networking, and cryptography.  相似文献   

6.
RFID的安全与隐私   总被引:2,自引:0,他引:2  
无线射频识别(RFID)技术中的数据安全和个人隐私问题日益突出,成为了阻碍RFID进一步发展的"瓶颈"。解决该问题需要有切实可行的综合技术解决方案和完善的法规、政策解决方案。可采取的技术解决方案包括:杀死标签、法拉第网罩、主动干扰、阻止标签、哈希(Hash)锁、随机Hash锁、Hash链、重加密等。目前,找到一个既能保护用户隐私和数据安全又能维持低成本的解决方案非常重要,不仅如此,还需要完善的RFID安全与隐私保护法规、政策配合。  相似文献   

7.
The smart grid is an electronically controlled electrical grid that connects power generation, transmission, distribution, and consumers using information communication technologies. One of the key characteristics of the smart grid is its support for bi-directional information flow between the consumer of electricity and the utility provider. This two-way interaction allows electricity to be generated in real-time based on consumers’ demands and power requests. As a result, consumer privacy becomes an important concern when collecting energy usage data with the deployment and adoption of smart grid technologies. To protect such sensitive information it is imperative that privacy protection mechanisms be used to protect the privacy of smart grid users. We present an analysis of recently proposed smart grid privacy solutions and identify their strengths and weaknesses in terms of their implementation complexity, efficiency, robustness, and simplicity.  相似文献   

8.
Object Detection, Tracking and Recognition for Multiple Smart Cameras   总被引:3,自引:0,他引:3  
Video cameras are among the most commonly used sensors in a large number of applications, ranging from surveillance to smart rooms for videoconferencing. There is a need to develop algorithms for tasks such as detection, tracking, and recognition of objects, specifically using distributed networks of cameras. The projective nature of imaging sensors provides ample challenges for data association across cameras. We first discuss the nature of these challenges in the context of visual sensor networks. Then, we show how real-world constraints can be favorably exploited in order to tackle these challenges. Examples of real-world constraints are a) the presence of a world plane, b) the presence of a three-dimiensional scene model, c) consistency of motion across cameras, and d) color and texture properties. In this regard, the main focus of this paper is towards highlighting the efficient use of the geometric constraints induced by the imaging devices to derive distributed algorithms for target detection, tracking, and recognition. Our discussions are supported by several examples drawn from real applications. Lastly, we also describe several potential research problems that remain to be addressed.   相似文献   

9.
10.
Ye  Liang  Yan  Susu  Zhen  Jialing  Han  Tian  Ferdinando  Hany  Seppänen  Tapio  Alasaarela  Esko 《Mobile Networks and Applications》2022,27(4):1688-1699
Mobile Networks and Applications - In recent years, physical violence detection has become a research hotspot in the area of human activity recognition. With the improvement and full coverage of...  相似文献   

11.
12.
随着社会的不断进步与信息化发展,数据库管理已经成为人类生活的重要组成部分,不仅方便了人们的生活,让繁杂的众多信息得到整理与管理。这不仅标志着人类走入信息华的网络时代,还标志着人类的文化的发展有更新的拓宽性发展。在进行数据库的管理中,越来越多的人开始注意数据管理的安全性与隐私保护等问题,这给数据库管的发展带来了助推的作用,在所有人类创造的事物中,无不都是为供应人们的生活的方便而创立出来的。而数据库的形式正是由于人们的需求而建立的,再由人们对其提出的宝贵意见或建议来推动信息化数据库的发展。从而使得人类更加进步。文章通过数据库的介绍以及基本的知识储备后,对数据库所存在的问题进行整理与归纳,然后进行分析根据分析提出合理化建议。  相似文献   

13.
蓝盾内网安全保密系统(BD-SECSYS)是由蓝盾信息安全技术股份有限公司自主研发的基于内网安全和防信息泄漏的内网安全集成系统。蓝盾信息安全技术股份有限公司基于多年积累的安全产品研发和实施经验,集中强大的研发队伍,推出了具有完善功能、稳定可靠和出色性能的内网安全集成产品。  相似文献   

14.
15.
智能卡的安全性   总被引:1,自引:0,他引:1  
智能卡就是带有微处理器(CPU)电路的IC卡.随着它的普及,有关智能卡的安全性问题就提到了日程上.文中主要讲述了涉及智能卡方面的一系列的安全问题及其本身的安全性设计.  相似文献   

16.
ENUM的安全性和隐私保护问题探讨   总被引:1,自引:0,他引:1  
电子号码(ENUM)是因特网工程任务组(IETF)中“电话号码映射”工作组提出的一项网络新技术,它把符合E.164标准的电话号码作为用户通信的入口,采用域名服务(DNS)技术和运行框架提供基于电话号码的通用目录服务。DNS是一种开放系统,给ENUM的安全性和隐私保护带来隐患。文中简要介绍ENUM技术及其发展现状,着重分析和探讨了ENUM中存在的安全性和隐私保护问题,并对ENUM中所用的安全协议做了比较。  相似文献   

17.
《中兴通讯技术》2016,(2):53-56
指出安全与隐私防护是大数据面临的两个重要的问题。认为大数据在引入新的安全问题和挑战的同时,也为信息安全领域带来了新的发展契机,即基于大数据的信息安全相关技术可以反过来用于大数据的安全和隐私保护。目前,基于大数据的数据真实性分析被广泛认为是最为有效的方法。认为信息安全企业未来的发展前景为:以底层大数据服务为基础,各个企业之间组成相互依赖、相互支撑的信息安全服务体系,通过构建安全大数据,逐步形成大数据安全生态环境。  相似文献   

18.
随着信息技术在涉密单位的广泛应用,在提高工作效率的同时,也带来了许多"保密安全"问题,计算机信息防泄密问题愈加突出。目前从上级单位通报转发的泄密事件来看,发生在互联网这个出口的不在少数,当事责任人违规或主观疏忽是主要原因。  相似文献   

19.
首先把基于RFID的信息分为三个安全域,然后分别阐述发生在这几个域的攻击方式,最后针对这些攻击方式,提出了一个协同工作模型来对RFID系统的安全进行防护.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号

京公网安备 11010802026262号