2003
DOI: 10.1109/maes.2003.1201453
|View full text |Cite
|
Sign up to set email alerts
|

Automated video protection, monitoring & detection

Abstract: The latest generation of computer vision technology is revolutionizing concepts, applications, and products in video surveillance and CCTV.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2007
2007
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Alan J. Lipton et al [32] have outlined two examples indicating that AVS based on computer vision technology is a useful piece of the solution for asset protection, perimeter monitoring, and threat detection. The Logan airport example demonstrates that this technology is desirable over other technologies because it is passive, relatively inexpensive, operationally effective, and provides real-time, actionable intelligence.…”
Section: Security Based Surveillance Systemmentioning
confidence: 99%
“…Alan J. Lipton et al [32] have outlined two examples indicating that AVS based on computer vision technology is a useful piece of the solution for asset protection, perimeter monitoring, and threat detection. The Logan airport example demonstrates that this technology is desirable over other technologies because it is passive, relatively inexpensive, operationally effective, and provides real-time, actionable intelligence.…”
Section: Security Based Surveillance Systemmentioning
confidence: 99%
“…Real-time automated tracking of moving objects is a technique that has a wide range of applications in various research and commercial fields [4]. Examples are self-driving cars [5,6], automated surveillance for incident detection and criminal activity [7], traffic flow control [8,9], interface for human-computer interactions and inputs [10][11][12], and patient care, including intensive care unit monitoring and epilepsy seizure alerting [1,13].…”
Section: Introductionmentioning
confidence: 99%
“…Other than that, there is possibility of leakage of CCTV videos due to several threats, and data security must be provided accordingly. Existing studies [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17] on CCTV security concentrated on security structure of CCTV network infrastructure, security policy, and utilization under specific environment (crime prevention, etc.). This paper shifts from such general topics to propose a user authentication protocol under network CCTV environment which reinforces CCTV monitoring with steganography and prevents malicious user access.…”
Section: Introductionmentioning
confidence: 99%