|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-1-84882-301-3 |
003 |
DE-He213 |
005 |
20220116075242.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 xxk| s |||| 0|eng d |
020 |
|
|
|a 9781848823013
|9 978-1-84882-301-3
|
024 |
7 |
|
|a 10.1007/978-1-84882-301-3
|2 doi
|
050 |
|
4 |
|a TA1634
|
072 |
|
7 |
|a UYQV
|2 bicssc
|
072 |
|
7 |
|a COM012000
|2 bisacsh
|
072 |
|
7 |
|a UYQV
|2 thema
|
082 |
0 |
4 |
|a 006.37
|2 23
|
245 |
1 |
0 |
|a Protecting Privacy in Video Surveillance
|h [electronic resource] /
|c edited by Andrew Senior.
|
250 |
|
|
|a 1st ed. 2009.
|
264 |
|
1 |
|a London :
|b Springer London :
|b Imprint: Springer,
|c 2009.
|
300 |
|
|
|a XVI, 208 p. 79 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a An Introduction to Automatic Video Surveillance -- Protecting and Managing Privacy Information in Video Surveillance Systems -- Privacy Protection in a Video Surveillance System -- Oblivious Image Matching -- Respectful Cameras: Detecting Visual Markers in Real-Time to Address Privacy Concerns -- Technical Challenges in Location-Aware Video Surveillance Privacy -- Protecting Personal Identification in Video -- Face De-identification -- Psychological Study for Designing Privacy Protected Video Surveillance System: PriSurv -- Selective Archiving: A Model for Privacy Sensitive Capture and Access Technologies -- BlindSpot: Creating Capture-Resistant Spaces.
|
520 |
|
|
|a The ubiquity of surveillance cameras linked with the power to automatically analyse video has driven societal fears about the loss of privacy. Responding to these concerns, researchers have started to look for ways that technology can be used to protect privacy. This unique, insightful and broad-ranging book presents the state of the art in the field of privacy protection mechanisms in video surveillance. Leading experts discuss the topic from various technical points of view, and examine surveillance from a societal perspective. There is also a focus on how these advanced technologies can be brought into real-world surveillance systems. Topics and features: Presents a comprehensive overview of automatic video surveillance systems Examines issues of surveillance and society with discussions of security versus privacy, the rise of surveillance, and public perceptions of privacy Investigates the level of privacy protection a system provides, and its dependency on the relationship between the watcher and the watched Discusses the use of mobile communications and privacy tokens to assert privacy from video surveillance Presents experimental studies of the deployment of privacy-protecting technologies Explores the design and performance analysis of systems that modify video to hide private data Describes the analysis and secure management of privacy containing streams Assesses the use of cryptographic protocols to limit access to private data Describes a system to detect cameras and prevent them from capturing images This rich array of cutting-edge research and current thinking in the field of video surveillance privacy will be an invaluable reference for researchers and graduate students needing to learn about the evolution of these topics. It will also be of real interest to video surveillance companies, data protection offices and privacy organisations. Dr Andrew W. Senior has more than 16 years research experience in pattern recognition and computer vision. His innovation in the field has yielded fifteen U.S. patents and over 60 publications.
|
650 |
|
0 |
|a Computer vision.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Pattern recognition systems.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Ethics.
|
650 |
1 |
4 |
|a Computer Vision.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Automated Pattern Recognition.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Moral Philosophy and Applied Ethics.
|
700 |
1 |
|
|a Senior, Andrew.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781848823051
|
776 |
0 |
8 |
|i Printed edition:
|z 9781848823006
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-1-84882-301-3
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|