12 research outputs found

    Adaptive Notification Delivery for Home Camera Feeds

    Get PDF
    Home security cameras generate notifications related to motion detection, person detection, person recognition, etc. when an event and/or person is detected within the camera feed. Detecting motion, attributing it to the presence of a person, and identifying the person require progressively greater amounts of time, and can lead to separate notifications in quick succession. Such notifications interrupt and burden users and can cause them to miss or ignore relevant ones. This disclosure describes techniques that reduce notification volume by introducing user-configurable cascading delays in delivering notifications to provide time for person recognition. For persons who are recognized, users receive a single optional notification while other notifications are suppressed. The techniques provide contextually appropriate and user-configurable suppression of notifications from home camera feeds without introducing an unreasonable delay in notification delivery. Notifications of relevance and value continue to be delivered, and with suppression of other notifications, can be more prominent

    CITRIC: A low-bandwidth wireless camera network platform

    Get PDF
    In this paper, we propose and demonstrate a novel wireless camera network system, called CITRIC. The core component of this system is a new hardware platform that integrates a camera, a frequency-scalable (up to 624 MHz) CPU, 16 MB FLASH, and 64 MB RAM onto a single device. The device then connects with a standard sensor network mote to form a camera mote. The design enables in-network processing of images to reduce communication requirements, which has traditionally been high in existing camera networks with centralized processing. We also propose a back-end client/server architecture to provide a user interface to the system and support further centralized processing for higher-level applications. Our camera mote enables a wider variety of distributed pattern recognition applications than traditional platforms because it provides more computing power and tighter integration of physical components while still consuming relatively little power. Furthermore, the mote easily integrates with existing low-bandwidth sensor networks because it can communicate over the IEEE 802.15.4 protocol with other sensor network platforms. We demonstrate our system on three applications: image compression, target tracking, and camera localization

    Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond

    No full text
    Abstract — New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, payment cards, and personal identification cards and documents. While RFID technology has existed for decades, these new applications carry with them substantial new privacy and security risks for individuals. These risks arise due to a combination of aspects involved in these applications: 1) The transponders are permanently embedded in objects individuals commonly carry with them 2) Static data linkable to an individual is stored on these transponders 3) The objects these transponders are embedded in are used in public places where individuals have limited control over who can access data on the transponder. In 2002, the U.S. Department of State proposed the adoption of an “electronic passport, ” which embedded RFID transponders into U.S. passports for identification and document security purposes. In this paper, we use the U.S. Government’s adoption process for the electronic passport as a case study for identifying the privacy and security risks that arise by embedding RFID technology in everyday things. We discuss the reasons why the Department of State did not adequately identify and address these privacy and security risks, even after the government’s process mandated a privacy impact assessment. We present recommendations to assist government as well as industry in early identification and resolution of relevant risks posed by RFID technology embedded in everyday things. We show how these risks exists with many new and upcoming applications of embedded RFID in everyday things and how these applications can benefit from the recommendations for a more secure and privacy preserving design. Index Terms — RFID, e-Passport
    corecore