SlideShare una empresa de Scribd logo
1 de 34
Video Surveillance preserving privacy Touradj Ebrahimi Ecole Polytechnique Fédérale de Lausanne (EPFL) Lausanne, Switzerland [email_address]
Surveillance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pros and cons of surveillance and data gathering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
World Trade Center, 9/11 Mohamed Atta  filmed by a Gas Station surveillance camera on September 10, 2001 filmed by an ATM surveillance camera on September 10, 2001
Attack on London underground, July 7, 2005 On a reconnaissance mission two weeks before the attack
Plot to attack trains in Germany, August 2006 Two unexploded bombs found in luggage aboard two trains Both terrorists have been arrested thanks to the video footage
Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why video surveillance? ,[object Object],[object Object],[object Object],[object Object]
Video surveillance technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Video surveillance technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Video surveillance appeal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Video surveillance efficiency ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Video surveillance efficiency ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Civil liberty and privacy ,[object Object],[object Object],[object Object],[object Object]
Abuse ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Switzerland ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EU ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EU – Directive 95/46/EC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
US ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Forensic video - admissibility ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Video surveillance dimensions ,[object Object],[object Object],[object Object],[object Object]
Video surveillance and content security tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Alternatives for video surveillance with privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart video surveillance […011001…]
Automatic event detection
Video surveillance preserving privacy Masking MPEG-7 camera Invertible   scrambling Invertible encryption
Privacy-sensitive Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scrambling Process
Unscrambling Process
Scrambling in MPEG-4 ,[object Object],[object Object]
Scrambling Level
Some illustrative examples Scrambler Unscrambler
Typical application ,[object Object],[object Object],[object Object],[object Object],Public Zone I X Public Zone II Y Private Zone Z ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],+ ,[object Object],[object Object],[object Object],Global Area
Concluding remarks…for now! ,[object Object],[object Object],[object Object]

Más contenido relacionado

Similar a Video Surveillance Preserving Privacy with Masking and Encryption

Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptxAlAsad4
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacyblogzilla
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Involving citizens in assessing dilemmas of privacy and security
Involving citizens in assessing dilemmas of privacy and securityInvolving citizens in assessing dilemmas of privacy and security
Involving citizens in assessing dilemmas of privacy and securityblogzilla
 
Crime reduction initiatives cctv
Crime reduction initiatives  cctvCrime reduction initiatives  cctv
Crime reduction initiatives cctvshannon newton
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholderskevinwetzel
 
Technology and Communication in Law Enforcement
Technology and Communication in Law EnforcementTechnology and Communication in Law Enforcement
Technology and Communication in Law EnforcementHarun Ma'hdi-El
 
Voice communication security
Voice communication securityVoice communication security
Voice communication securityFabio Pietrosanti
 
Intersection of video analytics and EU legislation - Ida Koskinen
Intersection of video analytics and EU legislation - Ida KoskinenIntersection of video analytics and EU legislation - Ida Koskinen
Intersection of video analytics and EU legislation - Ida KoskinenMindtrek
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primerHector Dominguez
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issuesblogzilla
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Klamberg
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Klamberg
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
City Wide Surveillance Using Search Based Video
City Wide Surveillance Using Search Based VideoCity Wide Surveillance Using Search Based Video
City Wide Surveillance Using Search Based Video3VR Security
 
Privacy & Data Protection: Staff Monitoring
Privacy & Data Protection: Staff MonitoringPrivacy & Data Protection: Staff Monitoring
Privacy & Data Protection: Staff MonitoringPeppe Santoro
 
ShareDocView.com - Biometric & Behavioural Mass Surveillance in EU Member States
ShareDocView.com - Biometric & Behavioural Mass Surveillance in EU Member StatesShareDocView.com - Biometric & Behavioural Mass Surveillance in EU Member States
ShareDocView.com - Biometric & Behavioural Mass Surveillance in EU Member StatesShareDocView.com
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)schermerbw
 

Similar a Video Surveillance Preserving Privacy with Masking and Encryption (20)

Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptx
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacy
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Involving citizens in assessing dilemmas of privacy and security
Involving citizens in assessing dilemmas of privacy and securityInvolving citizens in assessing dilemmas of privacy and security
Involving citizens in assessing dilemmas of privacy and security
 
Crime reduction initiatives cctv
Crime reduction initiatives  cctvCrime reduction initiatives  cctv
Crime reduction initiatives cctv
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
Technology and Communication in Law Enforcement
Technology and Communication in Law EnforcementTechnology and Communication in Law Enforcement
Technology and Communication in Law Enforcement
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
Intersection of video analytics and EU legislation - Ida Koskinen
Intersection of video analytics and EU legislation - Ida KoskinenIntersection of video analytics and EU legislation - Ida Koskinen
Intersection of video analytics and EU legislation - Ida Koskinen
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
External Systems
External SystemsExternal Systems
External Systems
 
City Wide Surveillance Using Search Based Video
City Wide Surveillance Using Search Based VideoCity Wide Surveillance Using Search Based Video
City Wide Surveillance Using Search Based Video
 
Pros and cons of today
Pros and cons of todayPros and cons of today
Pros and cons of today
 
Privacy & Data Protection: Staff Monitoring
Privacy & Data Protection: Staff MonitoringPrivacy & Data Protection: Staff Monitoring
Privacy & Data Protection: Staff Monitoring
 
ShareDocView.com - Biometric & Behavioural Mass Surveillance in EU Member States
ShareDocView.com - Biometric & Behavioural Mass Surveillance in EU Member StatesShareDocView.com - Biometric & Behavioural Mass Surveillance in EU Member States
ShareDocView.com - Biometric & Behavioural Mass Surveillance in EU Member States
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)
 

Más de Touradj Ebrahimi

An overview of fake media and its evolution
An overview of fake media and its evolutionAn overview of fake media and its evolution
An overview of fake media and its evolutionTouradj Ebrahimi
 
An overview of recent and ongoing JPEG standardisation activities
An overview of recent and ongoing JPEG standardisation activitiesAn overview of recent and ongoing JPEG standardisation activities
An overview of recent and ongoing JPEG standardisation activitiesTouradj Ebrahimi
 
The next generation JPEG standards
The next generation JPEG standardsThe next generation JPEG standards
The next generation JPEG standardsTouradj Ebrahimi
 
ICIP2016 Panel on "Is compression dead or are we wrong again?"
ICIP2016 Panel on "Is compression dead or are we wrong again?"ICIP2016 Panel on "Is compression dead or are we wrong again?"
ICIP2016 Panel on "Is compression dead or are we wrong again?"Touradj Ebrahimi
 
ICIP2016 image compression grand challenge
ICIP2016 image compression grand challengeICIP2016 image compression grand challenge
ICIP2016 image compression grand challengeTouradj Ebrahimi
 
Realization of Enhanced Reality Mobile Communication
Realization of Enhanced Reality  Mobile CommunicationRealization of Enhanced Reality  Mobile Communication
Realization of Enhanced Reality Mobile CommunicationTouradj Ebrahimi
 
JPEG PLENO - Towards a New Standard for Plenoptic Image Compression
JPEG PLENO - Towards a New Standard for Plenoptic Image CompressionJPEG PLENO - Towards a New Standard for Plenoptic Image Compression
JPEG PLENO - Towards a New Standard for Plenoptic Image CompressionTouradj Ebrahimi
 
Globally Networked Cameras - The Good, the Bad and The Ugly
Globally Networked Cameras - The Good, the Bad and The UglyGlobally Networked Cameras - The Good, the Bad and The Ugly
Globally Networked Cameras - The Good, the Bad and The UglyTouradj Ebrahimi
 
Reversible visual privacy protection
Reversible visual privacy protectionReversible visual privacy protection
Reversible visual privacy protectionTouradj Ebrahimi
 
Overview of JPEG standardization committee activities
Overview of JPEG standardization committee activitiesOverview of JPEG standardization committee activities
Overview of JPEG standardization committee activitiesTouradj Ebrahimi
 
A manifesto on the future of image coding - JPEG Pleno
A manifesto on the future of image coding - JPEG PlenoA manifesto on the future of image coding - JPEG Pleno
A manifesto on the future of image coding - JPEG PlenoTouradj Ebrahimi
 
Beyond Quality of Experience
Beyond Quality of ExperienceBeyond Quality of Experience
Beyond Quality of ExperienceTouradj Ebrahimi
 
Comparison of compression efficiency between HEVC and VP9 based on subjective...
Comparison of compression efficiency between HEVC and VP9 based on subjective...Comparison of compression efficiency between HEVC and VP9 based on subjective...
Comparison of compression efficiency between HEVC and VP9 based on subjective...Touradj Ebrahimi
 
Quality of Experience in emerging visual communications
Quality of Experience in emerging visual communicationsQuality of Experience in emerging visual communications
Quality of Experience in emerging visual communicationsTouradj Ebrahimi
 
Privacy protection of visual information
Privacy protection of visual informationPrivacy protection of visual information
Privacy protection of visual informationTouradj Ebrahimi
 
Subjective quality evaluation of the upcoming HEVC video compression standard
Subjective quality evaluation of the upcoming HEVC video compression standard Subjective quality evaluation of the upcoming HEVC video compression standard
Subjective quality evaluation of the upcoming HEVC video compression standard Touradj Ebrahimi
 
Security and Trust in social media networks
Security and Trust in social media networksSecurity and Trust in social media networks
Security and Trust in social media networksTouradj Ebrahimi
 
Towards 3D visual quality assessment for future multimedia
Towards 3D visual quality assessment for future  multimediaTowards 3D visual quality assessment for future  multimedia
Towards 3D visual quality assessment for future multimediaTouradj Ebrahimi
 
Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...
Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...
Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...Touradj Ebrahimi
 

Más de Touradj Ebrahimi (20)

An overview of fake media and its evolution
An overview of fake media and its evolutionAn overview of fake media and its evolution
An overview of fake media and its evolution
 
An overview of recent and ongoing JPEG standardisation activities
An overview of recent and ongoing JPEG standardisation activitiesAn overview of recent and ongoing JPEG standardisation activities
An overview of recent and ongoing JPEG standardisation activities
 
The next generation JPEG standards
The next generation JPEG standardsThe next generation JPEG standards
The next generation JPEG standards
 
ICIP2016 Panel on "Is compression dead or are we wrong again?"
ICIP2016 Panel on "Is compression dead or are we wrong again?"ICIP2016 Panel on "Is compression dead or are we wrong again?"
ICIP2016 Panel on "Is compression dead or are we wrong again?"
 
ICIP2016 image compression grand challenge
ICIP2016 image compression grand challengeICIP2016 image compression grand challenge
ICIP2016 image compression grand challenge
 
Realization of Enhanced Reality Mobile Communication
Realization of Enhanced Reality  Mobile CommunicationRealization of Enhanced Reality  Mobile Communication
Realization of Enhanced Reality Mobile Communication
 
JPEG PLENO - Towards a New Standard for Plenoptic Image Compression
JPEG PLENO - Towards a New Standard for Plenoptic Image CompressionJPEG PLENO - Towards a New Standard for Plenoptic Image Compression
JPEG PLENO - Towards a New Standard for Plenoptic Image Compression
 
JPEG emerging standards
JPEG emerging standardsJPEG emerging standards
JPEG emerging standards
 
Globally Networked Cameras - The Good, the Bad and The Ugly
Globally Networked Cameras - The Good, the Bad and The UglyGlobally Networked Cameras - The Good, the Bad and The Ugly
Globally Networked Cameras - The Good, the Bad and The Ugly
 
Reversible visual privacy protection
Reversible visual privacy protectionReversible visual privacy protection
Reversible visual privacy protection
 
Overview of JPEG standardization committee activities
Overview of JPEG standardization committee activitiesOverview of JPEG standardization committee activities
Overview of JPEG standardization committee activities
 
A manifesto on the future of image coding - JPEG Pleno
A manifesto on the future of image coding - JPEG PlenoA manifesto on the future of image coding - JPEG Pleno
A manifesto on the future of image coding - JPEG Pleno
 
Beyond Quality of Experience
Beyond Quality of ExperienceBeyond Quality of Experience
Beyond Quality of Experience
 
Comparison of compression efficiency between HEVC and VP9 based on subjective...
Comparison of compression efficiency between HEVC and VP9 based on subjective...Comparison of compression efficiency between HEVC and VP9 based on subjective...
Comparison of compression efficiency between HEVC and VP9 based on subjective...
 
Quality of Experience in emerging visual communications
Quality of Experience in emerging visual communicationsQuality of Experience in emerging visual communications
Quality of Experience in emerging visual communications
 
Privacy protection of visual information
Privacy protection of visual informationPrivacy protection of visual information
Privacy protection of visual information
 
Subjective quality evaluation of the upcoming HEVC video compression standard
Subjective quality evaluation of the upcoming HEVC video compression standard Subjective quality evaluation of the upcoming HEVC video compression standard
Subjective quality evaluation of the upcoming HEVC video compression standard
 
Security and Trust in social media networks
Security and Trust in social media networksSecurity and Trust in social media networks
Security and Trust in social media networks
 
Towards 3D visual quality assessment for future multimedia
Towards 3D visual quality assessment for future  multimediaTowards 3D visual quality assessment for future  multimedia
Towards 3D visual quality assessment for future multimedia
 
Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...
Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...
Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...
 

Último

Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Último (20)

Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

Video Surveillance Preserving Privacy with Masking and Encryption

Notas del editor

  1. Welcome