Proceedings of the Second ACM/IEEE Symposium on Edge Computing 2017
DOI: 10.1145/3132211.3134457
|View full text |Cite
|
Sign up to set email alerts
|

ePrivateeye

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Moreover, there have been some specific attempts to leverage the advancement in machine learning and object-detection technologies to localize privacy-sensitive objects [7][8][9]38,39]. These works give some insight about how to build privacy-aware real-time video analytics in the surveillance systems, but they offer no viable solution for preserving privacy.…”
Section: Advancements In Object-detection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, there have been some specific attempts to leverage the advancement in machine learning and object-detection technologies to localize privacy-sensitive objects [7][8][9]38,39]. These works give some insight about how to build privacy-aware real-time video analytics in the surveillance systems, but they offer no viable solution for preserving privacy.…”
Section: Advancements In Object-detection Methodsmentioning
confidence: 99%
“…In other words, the capabilities of the deployed cameras could be potentially exploited or abused which worsens the risk of the privacy breaches of individuals. As the surveillance cameras become more powerfully equipped with better optical and digital zooms, the more likely they are to be abused to peek via windows to gather unauthorized private information on activities or behavioral patterns of individuals and to perform voyeurism unless preventive measures are enforced by design [5,7,8]. For instance, maneuverable cameras, like pan-tilt-zoom (PTZ) cameras, could be abused and directed to intrusively spy on other people in their apartments like the case where a security guard spied on the private apartment of the German Chancellor Angela Merkel using a museum's CCTV camera [2].…”
Section: Introductionmentioning
confidence: 99%
“…Similar research is conducted by a number of researchers (e.g., [27,28]). To that end, those approaches comply with anonymization approaches required to bypass GDPR regulations.…”
Section: Approaches To Preserve Privacy In Video-based Surveillancementioning
confidence: 97%