Näytä suppeat kuvailutiedot

dc.contributor.authorTurtiainen, Hannu
dc.contributor.authorCostin, Andrei
dc.contributor.authorHämäläinen, Timo
dc.contributor.authorLahtinen, Tuomo
dc.contributor.authorSintonen, Lauri
dc.date.accessioned2023-03-22T10:30:28Z
dc.date.available2023-03-22T10:30:28Z
dc.date.issued2022
dc.identifier.citationTurtiainen, H., Costin, A., Hämäläinen, T., Lahtinen, T., & Sintonen, L. (2022). CCTV-FullyAware : toward end-to-end feasible privacy-enhancing and CCTV forensics applications. In <i>TrustCom 2022 : Proceedings of the IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications </i> (pp. 1227-1234). IEEE. IEEE International Conference on Trust, Security and Privacy in Computing and Communications. <a href="https://doi.org/10.1109/trustcom56396.2022.00170" target="_blank">https://doi.org/10.1109/trustcom56396.2022.00170</a>
dc.identifier.otherCONVID_176940802
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/86092
dc.description.abstractIt is estimated that over 1 billion Closed-Circuit Television (CCTV) cameras are operational worldwide. The advertised main benefits of CCTV cameras have always been the same; physical security, safety, and crime deterrence. The current scale and rate of deployment of CCTV cameras bring additional research and technical challenges for CCTV forensics as well, as for privacy enhancements. This paper presents the first end-to-end system for CCTV forensics and feasible privacy-enhancing applications such as exposure measurement, CCTV route recovery, CCTV-aware routing/navigation, and crowd-sourcing. For this, we developed and evaluated four complex and distinct modules (CCTVCV [1], OSRM-CCTV [2], BRIMA [3], CCTV-Exposure [4]), all of which are novel, unique, peer-reviewed, and can be used either separately or within an integrated end-to-end system such as CCTV-FullyAware. We release all our artefacts as open-source/open data. We hope our work will bootstrap policy-driving discussions and large-scale applications such as CCTV forensics and privacy-enhancing technologies.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherIEEE
dc.relation.ispartofTrustCom 2022 : Proceedings of the IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications
dc.relation.ispartofseriesIEEE International Conference on Trust, Security and Privacy in Computing and Communications
dc.rightsIn Copyright
dc.subject.othermachine learning
dc.subject.othernavigation
dc.subject.otherobject detection
dc.subject.otherprivacy-enhancing technologies
dc.subject.othervideo surveillance
dc.titleCCTV-FullyAware : toward end-to-end feasible privacy-enhancing and CCTV forensics applications
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202303222241
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-6654-9426-7
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange1227-1234
dc.relation.issn2324-898X
dc.type.versionacceptedVersion
dc.rights.copyright© 2022 IEEE
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceIEEE International Conference On Trust, Security And Privacy In Computing And Communications
dc.subject.ysotekninen rikostutkinta
dc.subject.ysoyksilönsuoja
dc.subject.ysokoneoppiminen
dc.subject.ysosovellusohjelmat
dc.subject.ysoyksityisyys
dc.subject.ysokonenäkö
dc.subject.ysokameravalvonta
dc.subject.ysotietosuoja
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p28613
jyx.subject.urihttp://www.yso.fi/onto/yso/p3637
jyx.subject.urihttp://www.yso.fi/onto/yso/p21846
jyx.subject.urihttp://www.yso.fi/onto/yso/p8456
jyx.subject.urihttp://www.yso.fi/onto/yso/p10909
jyx.subject.urihttp://www.yso.fi/onto/yso/p2618
jyx.subject.urihttp://www.yso.fi/onto/yso/p4713
jyx.subject.urihttp://www.yso.fi/onto/yso/p3636
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1109/trustcom56396.2022.00170
jyx.fundinginformationThe authors acknowledge the grants of computer capacity from the Finnish Grid and Cloud Infrastructure (persistent identifier urn:nbn:fi:research-infras-2016072533). Part of this research was supported by a grant from the Decision of the Research Dean on research funding within the Faculty (07.04.2021), and Decision of the Research Dean on research funding within the Faculty (20.04.2022) of the Faculty of Information Technology of University of Jyväskylä. Hannu Turtiainen also thanks the Finnish Cultural Foundation / Suomen Kulttuurirahasto (https://skr.fi/en) for supporting his Ph.D. dissertation work and research (under grant decision no.00221059) and the Faculty of Information Technology of the University of Jyväskylä (JYU), in particular, Prof. Timo Hämäläinen, for partly supporting and supervising his Ph.D. work at JYU in 2021–2023. The authors also acknowledge the use of royalty-free icons courtesy of www.flaticon.com (icons by: Good Ware, Freepik, itim2101, Pixel perfect, Icongeek26, Eucalyp, prettycons, and Stockio). Map image in Fig. 4 is generated with Folium (for Python) library (https://python-visualization.github.io/folium/) using OpenStreetMap data (https://www.openstreetmap.org).
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright