A person's privacy has become a growing concern, given the nature of an expansive reliance on real-time video activities with video capture, stream, and storage. This paper presents an innovative system design based on a privacy-preserving model. The proposed system design is implemented by employing an enhanced capability that overcomes today's single parameterbased access control protection mechanism for digital privacy preservation. The enhanced capability combines multiple access control parameters: facial expression, resource, environment, location, and time. The proposed system design demonstrated that a person's facial expressions combined with a set of access control rules can achieve a person's privacy-preserving preferences. The findings resulted in different facial expressions successfully triggering a person's face to be blurred and a person's privacy when using a real-time video conferencing service captured from a webcam or virtual webcam. A comparison analysis of capabilities between existing designs and the proposed system design shows enhancement of the capabilities of the proposed system. A series of experiments exercising the enhanced, real-time multi-parameterbased system was shown as a viable path forward for preserving a person's privacy while using a webcam or virtual webcam to capture, stream, and store videos.
A mobile telecommunications network has arguably become a vital part of today’s critical communications infrastructure underpinning society’s interconnectedness. A mobile telecommunications network can be considered a critical communications infrastructure that has been built upon a complex set of network technologies. However, the migration in recent years from pre-5G to 5G network technologies has presented the mobile telecommunications network operators with not only several security-related challenges but also potential unfortunate risk exposure. A new approach called Control-Risk-Correctness (CRC) addresses the need for evaluating a complex mix of network technology and the associated trade-offs between security and risk. CRC simplifies the analysis by examining the mobile telecommunications network from the perspective of security control effectiveness and risk treatments. This article outlines the application of CRC when assessing a mobile telecommunication network and highlights direct risk mitigation treatments in an aim to increase security control effectiveness and decrease risk exposure. CRC usefulness will assist in the evaluation of existing networks and safeguarding new networks over the coming years.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.