Spelling suggestions: "subject:"2security camera"" "subject:"bsecurity camera""
1 |
Security with visual understanding : Kinect human recognition capabilities applied in a home security system / Kinect human recognition capabilities applied in a home security systemFluckiger, S Joseph 08 August 2012 (has links)
Vision is the most celebrated human sense. Eighty percent of the information humans receive is obtained through vision. Machines capable of capturing images are now ubiquitous, but until recently, they have been unable to recognize objects in the images they capture. In effect, machines have been blind.
This paper explores the revolutionary new capability of a camera to recognize whether a human is present in an image and take detailed measurements of the person’s dimensions. It explains how the hardware and software of the camera work to provide this remarkable capability in just 200 milliseconds per image.
To demonstrate these capabilities, a home security application has been built called Security with Visual Understanding (SVU). SVU is a hardware/software solution that detects a human and then performs biometric authentication by comparing the dimensions of the seen person against a database of known people. If the person is unrecognized, an alarm is sounded, and a picture of the intruder is sent via SMS text message to the home owner. Analysis is performed to measure the tolerance of the SVU algorithm for differentiating between two people based on their body dimensions. / text
|
2 |
Customer Tracking Through Security Camera Video ProcessingKourennyi, Dmitri Dmitrievich January 2011 (has links)
No description available.
|
3 |
IoT Security Assessment of a Home Security CameraHjärne, Nina, Kols, Ida January 2021 (has links)
The amount of IoT devices in society is increasing.With this increase there is an inherently higher risk of hackersexploiting the vulnerabilities of such a device, accessing sensitivepersonal information. The objective of this project was to assessthe security level of a home security camera through findingvulnerabilities and exploiting them. The method used for thiswas to analyze the system and its communication, threat modelthe system to identify threats, perform vulnerability analysisand exploit the vulnerabilities through penetration testing. Theattacks on the system did not succeed and the system wasdeclared secure in the vulnerability analysis. From the aspectstested in this project, it can be assumed that safety precautionshave been taken to secure the home security camera frommalicious hackers. / Antalet IoT-produkter i samhället ökar ochmed fler och fler uppkopplade produkter i våra hem ökarrisken att hackare utnyttjar produkters sårbarheter för ondaavsikter, till exempel för att komma åt känslig personlig data.Målet med det här projektet var att hitta sårbarheter i ensäkerhetskamera för hemmet, attackera dem och utifrån resultatetbedöma hur säker produkten är. Detta gjordes genomatt analysera systemet och dess kommunikation, göra en hotmodellför att identifiera hot, genomföra sårbarhetsanalys ochsedan penetrationstesta hoten. Hackningsattackerna misslyckadesoch produkten bedömdes som säker i sårbarhetsanalysen.Utifrån de aspekter som testades i projektet kunde det bedömasatt grundläggande säkerhetsåtgärder vidtagits för att skyddasäkerhetskameran från hackare. / Kandidatexjobb i elektroteknik 2021, KTH, Stockholm
|
4 |
Säkerhetsutvärdering av säkerhetskameror för smarta hem / Security evaluation of security cameras for smart homesStröm, Julia January 2024 (has links)
Säkerhetskameror spelar en avgörande roll i att skydda våra smarta hem, men om de inte håller tillräckligt höga säkerhetsstandarder, kan de i stället minska bostadens säkerhet och riskera att exponera känslig privat information. Denna rapport ämnar att noggrant utvärdera säkerhetsaspekterna hos ett urval av säkerhetskameror för att bestämma deras förmåga att effektivt skydda användarnas privatliv och säkerhet. Analysen avslöjade att de granskade kamerorna inte uppvisade några allvarliga säkerhetsbrister. Det upptäcktes dock ett antal mindre förbättringsområden som, om åtgärdade, skulle kunna stärka deras skyddsförmåga ytterligare. / Security cameras play a crucial role in protecting our smart homes, but if they do not meet sufficiently high security standards, they can decrease the safety of the home and risk exposing sensitive private information. This report aims to thoroughly evaluate the security aspects of a selection of security cameras to determine their ability to effectively protect users' privacy and safety. The analysis revealed that the reviewed cameras did not exhibit any major security flaws. However, a few minor improvement areas were identified which, if addressed, could further enhance their protective capabilities.
|
5 |
Fyzická bezpečnost v průmyslovém podniku / Physical Security in an Industrial CompanyKonečný, Pavel January 2017 (has links)
The diploma thesis focuses on physical security solutions in an organization acting in a metallurgy segment. The analytical part identifies the weaknesses in individual areas of physical security according to ČSN/ISO 27 000 regulation. The practical part is divided into individual chapters bringing suggestions for corrections, modernization and modifications of the system. The theoretical part deals mainly with clarification of the terminology and proceses used in the practical part. I see the benefit of my work in the practical suggestions for the changes. If they are implemented correctly, the physical security of the organization will be of high quality.
|
6 |
Cybersecurity Evaluation of an IP CameraStroeven, Tova, Söderman, Felix January 2022 (has links)
The prevalence of affordable internet-connected cameras has provided many with new possibilities, including keeping a watchful eye on property and family members from afar. In order to avoid serious breaches of privacy, it is necessary to consider whether these devices are secure. This project aims to evaluate the cybersecurity of one such device, an IP camera from Biltema. This was done by performing an extensive analysis of the camera, determining possible vulnerabilities, and performing penetration tests based on identified vulnerabilities. The tests included capturing and analyzing network traffic, attempting to crack the camera credentials, and attempting to disable the camera completely. The conclusions were that the camera should not be used for any security applications and is unsuitable to use in situations where one's privacy is important. / Det breda utbudet av prisvärda och kameror med internet uppkopling har medfört helt nya möjligheter. Idag är det till exempel möjligt att hålla koll på sina barn utan att vara i rummet, eller hålla ett öga på hemmet via mobilen. Det är dock nödvändigt att reflektera över om dessa enheter är säkra, för att undvika allvarliga integritetsintrång. Projekets syfte är att utvärdera cybersäkerheten hos en sådan enhet, en IP-kamera från Biltema. Utvärderingen bestod av en omfattande analys av kameran, identifikation av möjliga sårbarheter och utförande av ett antal penetrationstester baserat på de upptäckta sårbarheterna. Testerna omfattade en analys av nätverkstrafik, att försöka knäcka kamerans inloggningssuppgifter samt att försöka inaktivera kameran. Slutsatsen var att kameran inte bör användas inom säkerhetstillämpningar och att den är olämplig i situationer där integritet är viktigt. / Kandidatexjobb i elektroteknik 2022, KTH, Stockholm
|
7 |
Monitorovací a zabezpečovací systém / Monitoring and Security SystemFelix, Martin January 2010 (has links)
This master's thesis deals with design and implementation of system for securing and monitoring objects. The whole system is serving as an application getaway between typical TCP/IP network and heterogeneous network containing different end devices such as security cameras, microphones and some sensors (e.g. for temperature measurement). In case of detected event, the notification is created, recorded and the user is informed via administrative front-end. System can be managed from remote location and data from devices can be shown by web interface. Theoretical part of this project concerns with the analysis of different types of connecting devices and sensors and the possibilities of their usage for the monitoring systems along with description of communications protocols for each end device. The next part deals with the cameras interfaces, content analysis and connectivity with central server. Practical part describes methods and techniques used for implementation of system.
|
Page generated in 0.0489 seconds