The Invisible Shadow: How Security Cameras Leak Private Activities.
Jian GongXinyu ZhangJu RenYaoxue ZhangPublished in: CCS (2021)
Keyphrases
- private information
- information flow
- information security
- security protection
- multi camera
- security issues
- statistical databases
- privacy preserving
- intrusion detection
- network security
- access control
- activity recognition
- single camera
- private data
- security requirements
- human activities
- multiple cameras
- security policies
- light source
- hand held
- social networks
- data privacy
- time of flight
- computer vision
- camera calibration