Adding Privacy Constraints to Video-Based Applications


Remote accessibility to video cameras, face recognition software, and searchable image and video databases enable automated video surveillance. The same technologies and features enabling advanced functionalities facilitate as well the misuse of a surveillance system and can lead to the infringement of the privacy of an individual. Examples of misuse are… (More)


4 Figures and Tables

Cite this paper

@inproceedings{Cavallaro2004AddingPC, title={Adding Privacy Constraints to Video-Based Applications}, author={Andrea Cavallaro}, booktitle={EWIMT}, year={2004} }