GB2569572A - A surveillance method, a surveillance apparatus, a surveillance system, and a program - Google Patents

A surveillance method, a surveillance apparatus, a surveillance system, and a program Download PDF

Info

Publication number
GB2569572A
GB2569572A GB1721420.6A GB201721420A GB2569572A GB 2569572 A GB2569572 A GB 2569572A GB 201721420 A GB201721420 A GB 201721420A GB 2569572 A GB2569572 A GB 2569572A
Authority
GB
United Kingdom
Prior art keywords
video data
data
mask
surveillance
operator client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1721420.6A
Other versions
GB201721420D0 (en
Inventor
Klausen Klaus
Skomial Lukasz
Sander Christensen Niels
Jensen Jeppe
Løfvall Jensen Søren
Simonsen Max
Holm Nielsen Preben
Fekete Robert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Canon Inc
Original Assignee
Canon Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Canon Inc filed Critical Canon Inc
Priority to GB1721420.6A priority Critical patent/GB2569572A/en
Publication of GB201721420D0 publication Critical patent/GB201721420D0/en
Publication of GB2569572A publication Critical patent/GB2569572A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/222Studio circuitry; Studio devices; Studio equipment
    • H04N5/262Studio circuits, e.g. for mixing, switching-over, change of character of image, other special effects ; Cameras specially adapted for the electronic generation of special effects
    • H04N5/272Means for inserting a foreground image in a background image, i.e. inlay, outlay

Abstract

A surveillance method comprises: receiving a request from a client to transmit video data having a capture time; and determining whether the video data is to be masked (obscured, obfuscated, etc, e.g. by blurring), wherein if it is determined that the video data is to be masked: obtaining mask (e.g. mask area or region) data that corresponds to the capture time of the requested video data; and sending the video data and the mask data to the client. The determination whether to mask or obscure the video data may be based on receiving client operator permission (authorisation) settings. The extent of masking (e.g. low to high blurring) may be based on a predetermined parameter. Masking may be based on a set range of capture times. Mask data may be metadata.

Description

A SURVEILLANCE METHOD, A SURVEILLANCE APPARATUS,
A SURVEILLANCE SYSTEM, AND A PROGRAM.
[0001] Technical Field [0002] The present invention relates to a surveillance method, a surveillance apparatus, a surveillance system, and a program, in particular provides for the masking of video data that has been captured, based upon security settings. This is particularly useful to the technical field of privacy masking.
[0003] Background [0004] Video surveillance apparatus typically capture video data that is to be displayed to a viewer for analysis. The video data may be masked so that the viewer is restricted from analysing at least a part of the video data. In many countries, it is not allowed to record people unless they are masked. This presents difficulties with using the video data for further investigation, since the people captured by the video data will be unrecognisable .
[0005] Video data can be viewed live, by displaying the video data at the time of capture, in accordance with masking requirements that are currently selected.
[0006] The masked video data is stored, so that it can be subsequently retrieved for playback. Thus, a recording of the video data can be retrieved that has been masked to restrict the view in accordance with the requirements that were in place at the time of capture.
[0007] A balance is to be found between providing privacy to the population, while still providing a way to recognise people. In many jurisdictions, there is a desire to recover the original video data, rather than using the masked video data Providing a way to recover the video data as originally captured is particularly useful for the analysis of crime scenes.
[0008] Summary [0009] Aspects of the present invention are set out by the independent claims.
[0010] According to a first aspect there is provided a surveillance method comprising: receiving a request from an operator client to transmit video data having a capture time; and determining whether the video data is to be masked, wherein if it is determined that the video data is to be masked: obtaining mask data that corresponds to the capture time of the requested video data; and sending the video data and the mask data to the operator client.
[0011] A technical effect of the mask data and the video data being stored separately, is that a way is provided for sending either the video data together with the mask data or the video data by itself. Thus, this technique provides the possibility for the originally captured video data to be recovered, at the same time as providing the possibility for the mask data that was selected at the time of capture to obscure the video data, depending upon user requirements. Advantageously, the determination that the video data is to be masked causes the video data and the mask data to be sent to the operator client, so that a viewer of the operator client can be presented with video data that has been masked by the mask data. The sending of mask data that corresponds to the time of capture of the video data means that features that have been selected to be masked are obscured by the mask data.
[0012] Preferably, if it is determined that the video data is not to be masked, the method comprising sending the video data to the operator client without sending mask data. A technical effect is that the operator client receives the video data, without there being any burden of mask data being transmitted or received.
Advantageously, the video data as originally captured can be presented by the operator client. This is particularly useful in jurisdictions for which video data as originally captured is relied upon as evidence, for example, in court cases.
[0013] Optionally, the determination of whether the video data is to be masked depends upon permission settings that are attributed to the operator client. An operator client for which the video data is to be restricted receives the video data together with the mask data. In contrast, an operator client that is permitted to display the video data does not need to receive the mask data, and so receives only the video data, thus avoiding
the burden received. of the mask data being sent or
[0014] As an alternative, the determination of
whether the video data is to be masked is
determined based on the identity of the viewer, rather than the identity of the operator client.
[0015] Optionally, the mask data defines an area of the video data that is to be masked.
Advantageously, a specific part of the video data can be masked in accordance with rules, so that it is not displayed to the user. For example, video data captured in a shop can be masked, so that the view through a window is obscured. Thus, members of the public outside of the shop can be masked in accordance with local requirements, such that the inside of the ship is not masked. However, it is also possible to select parts of the shop that are to be masked, for example, the cash register. Furthermore, it is possible for the mask data to define a plurality of areas of video data that are to be masked.
[0016] Optionally, the video data is obscured by the mask data to an extent according to a predetermined parameter. A technical effect is that if the parameter takes a minimum value then a low amount of blurring of the video data is performed, and if the parameter takes a maximum value then a high amount of blurring of the video data is performed. Advantageously, the level of masking can be selected.
[0017] Optionally, the surveillance method further comprises: setting a range of capture times for which the mask data is to mask the video data. Advantageously, a time period can be selected over which the video data is to be obscured.
[0018] Optionally, the surveillance method further comprises determining whether the operator client is authorised to receive video data, wherein if it is determined that the operator client is authorised to receive video data, transmitting the video data to the operator client, together with the mask data if appropriate, and wherein if it is determined that the operator client is not authorised to receive video data, declining the request to transmit video data. Advantageously, the identity of the operator client is used to determine whether to transmit the video data, thus enhancing security.
[0019] As an alternative, the authorisation of whether the operator client is to receive the video data is determined based on the identity of the viewer, rather than the identity of the operator client.
[0020] Optionally, the mask data is obtained from a management server. Advantageously, the management server stores mask data that has been selected by a user of a management client.
[0021] Optionally, the sending of video data to the operator client occurs at the capture time. Advantageously, the video data is presented live to the viewer at the time of capture.
[0022] Optionally, the surveillance method further comprises: storing, in a memory, the video data together with the capture time; retrieving, from the memory, the video data corresponding to the capture time in response to the request being received from the operator client; and transmitting to the operator client, the video data, together with the mask data if appropriate. Advantageously, the video data is presented to the viewer as a recording.
[0023] Optionally, the surveillance method according to any preceding claim, further comprises: receiving, by the operator client, the video data, together with the mask data if appropriate; and rendering, by the operator client, the video data and mask data together, so that the video data is masked according to the mask data. Advantageously, if mask data is received by the operator client, the operator client uses the mask data to mask the video data. Accordingly, a viewer will be presented with video data that has been obscured by the mask data.
[0024] Optionally, the video data comprises the mask data as metadata.
[0025] According to a second aspect there is provided a surveillance apparatus comprising: a receiver configured to receive a request from an operator client to transmit video data having a capture time; and a processor configured to determine whether the video data is to be masked, wherein if it is determined that the video data is to be masked: the surveillance apparatus obtaining mask data that corresponds to the capture time of the requested video data; and the surveillance apparatus sending the video data and the mask data to the operator client.
[0026] According to a third aspect there is provided a surveillance system comprising: a surveillance apparatus according to the second aspect; and a management server configured to store the mask data in a memory, wherein the surveillance apparatus is configured to obtain the mask data from the memory of the management server.
[0027] Optionally, the surveillance system further comprises the operator client configured to request the transmission of video data from the surveillance apparatus, and receive the video data, together with the mask data if appropriate.
[0028] According to a fourth aspect there is provided a program that, when implemented on a surveillance apparatus, causes the surveillance apparatus to perform a surveillance method according to the first aspect.
[0029] According to a fifth aspect there is provided a computer-readable medium storing a program according to the fourth aspect.
[0030] Brief description of the drawings [0031] Embodiments will now be described, by way of example only, with reference to the accompanying drawings, in which:
[0032] FIG. 1 is a schematic diagram which illustrates the arrangement of a surveillance system;
[0033] FIG. 2 is a schematic diagram illustrating the arrangement of components of a computer;
[0034] FIG. 3 is a flowchart illustrating the operation of a management client;
[0035] FIG. operation 4 of is a flowchart a management server; illustrating the
[0036] FIG. 5 is a flowchart illustrating the
operation of an operator client; and
[0037] FIG. 6 is a flowchart illustrating the
operation of a recording server.
[0038] Detailed description [0039] Various exemplary embodiments, features, and aspects of the invention will be described in detail below with reference to the drawings. Each of the embodiments of the present invention described below can be implemented solely or as a combination of a plurality of the embodiments or features thereof where necessary or where the combination of elements or features from individual embodiments in a single embodiment is beneficial.
[0040] FIG. 1 shows a possible arrangement for a video surveillance system 100, which is configured to store and to display video data that has been captured by surveillance apparatus 161-162. The video data can be displayed live, or displayed as a recording by retrieving the video data from a memory.
[0041] FIG. 1 shows an operator client 111 that is provided for use by a security guard or other user in order to monitor or review the output of one or more surveillance apparatus 161-163. The
surveillance apparatus includes cameras 161- -163
which are arranged in the vicinity of an
environment that is to be surveyed.
[0042] A management client 112 is provided for use
by an administrator to determine the permission status for a specific operator client 111, which could be dependent upon the identity of a specific user of the operator client 111.
[0043] The management client 112 is also used by the administrator to select mask data that is to be used to mask the video data. For example, the system 100 could be configured for a shop so that mask data is used to mask selected areas of the video data while the shop is open. However, while the shop is closed, the mask data is modified or removed, so that video data showing intruders in the shop can be viewed without being masked.
[0044] Consequently, the video surveillance system 100 can be configured to comply with local requirements, such as government regulations, allowing confidentiality to be maintained, while providing security of the surveyed environment.
[0045]
A technical effect of sending the video data together with the mask data is that the video feed is obscured by a mask.
If the mask data is updated, this does not affect the mask data that is used when the operator is viewing playback video, because the playback video will be displayed together with the mask data that was set at the time of capture. However, the updated mask data will be applied to video data that is captured live, and will be stored when recording the video feed, so that the updated mask data is used during subsequent playback. Thus, the mask data is selected using the management client 112, and stored by the management server 130.
[0046] The mask data defines an area of the video data that is to be obscured. The area corresponds to the field of view of the surveillance apparatus 161-163 that have been identified by the management client 112, such as a window of a shop, because there may be an obligation for the capture of public places to be restricted. The area of the
video data is determined by a user selecting
coordinates of the frames of the video data that
are to be masked. Within a shop, the mask data
could include an area ne ar the cash register.
Parts of the shop where customers are expected to be can be masked, so that they cannot be identified.
[0047] It is possible for the mask data to define a plurality of areas of video data that are to be masked. The different areas can be defined differently, such that the type of masking can be selected to correspond to the different areas. Accordingly, the different areas can be assigned different levels of obfuscation. Furthermore, for each of the different areas, it can be specified whether the feature should be masked during an investigation.
[0048] The operator client 111 and the management client 112 are configured to communicate via a network/bus 121 with a management server 130, a recording server 151, and a plurality of surveillance apparatus 161-163. The recording server 151 communicates with the surveillance apparatus 161-163 via a network/bus 122. The video surveillance system 100 can input and output data via a gateway 180 to an external network.
[0049] FIG. 2 shows a typical arrangement for a computer 200. A processor 210 is configured to communicate via a network/bus 220 with a memory 230, and a display 240. An input/output port 250, comprising an input 251 and an output 252, is configured so that the computer 200 can communicate with other devices.
[0050] The processor 210 is used to control the analysis of data performed by the processor 210. Data is stored in the memory 230, which includes a non-volatile memory, such as a hard disk, for long term data storage and RAM for short term data storage. The display 240 is used to convey information to the user, which is achieved using a monitor. The input/output port 250 allows a user to give instructions to the computer 200 using a mouse and a keyboard, receives data from other devices, and transmits data via the network.
[0051] The operator client 111, the management client 112, the management server 130, and the recording server 151, have a system architecture consistent with the computer 200 shown in FIG. 2. The description of FIG. 2 is greatly simplified and any suitable computer architecture may be used. For example, it is not necessary that all the components of the system 100 comprise a display 240, because information can be conveyed to users of specific components, in particular the operator client 111 and the management client 112. The functions of the different components can be distributed within the system 100 as appropriate, such as all of the functions being provided by a single computer 200.
[0052] FIG. 3 is a flowchart illustrating the operation S300 of the management client 112. In step S301, the management client 113 receives from an administrator the permission status instructions of operator client 111. As an alternative, the permission status can relate to a viewer who has logged in to the operator client 111, rather than the operator client 111 itself. In step S302, the permission status instructions that were entered into the management client 112 in step S301 are transmitted to the management server 130, where these permission settings are stored by the memory 230 of the management server 130. In step S303, the management client 113 receives from the administrator the selection of mask data that is to be applied to video data. The mask data is to be attributed to any video data that is captured at the time when the mask data has been selected. As an alternative, a range of times can be selected by the administrator, so that the mask data is associated with any video data that has a capture time within a time period corresponding to the range of times. In step S304, the mask data instructions that were entered into the management client in step S303 are transmitted to the management server 130, where the mask data is stored by the memory 230 of the management server 130.
[0053] A technical effect of attributing the mask data to the video data for the time of capture is that playback of the video data will be masked according to the mask data that was selected at the time of capture. Accordingly, if the cash register is moved, the mask data can be updated, so that playback of the video data will mask the cash register both before and after the cash register was moved. Furthermore, by selecting mask data according to the time of capture means that the video data is masked during working hours when the shop is open, and the video data is not masked when the shop is closed. Accordingly, the mask data can be manually modified so that a list of mask data is stored by the management server 130 for any given time for each of the cameras 161163, in order to apply the mask data as it was configured at the time when the video data was captured.
[0054] FIG. 4 is a flowchart illustrating the operation S400 of the management server 130. In step S402, the management server 130 receives the permission status instructions that were transmitted by the management client 112 in step S302. In step S404, the management server 130 receives the mask data instructions that were transmitted by the management client 112 in step S304. In step S405, the management server 130 receives an authorization request from recording server 151, so that the recording server 151 can determine whether an operator client 111 is authorised to receive video data. In step S406, the management server 130 declines or accepts the authorisation request, based upon whether the permission status allows the operator client 111 to receive the video data. In step S407, the management server 130 receives from the recording server 151 a request for any mask data that is associated with the video data. The mask data that is requested corresponds to the capture time of the video data. In step S408, the mask data is sent to the recording server 151, such that the mask data corresponds to the mask data that is to be associated with video data having the capture time .
[0055] FIG. 5 is a flowchart illustrating the operation S500 of the operator client 111. In step S501, the operator client 111 sends a reguest for video data to recording server 151.
[0056] In step S505 it is determined by the recording server 151 whether the operator client 111 is authorised to view the video data. If the operator client 111 is not authorised to view the video data, in step S506 the request for video data is declined. Alternatively, the recording server 151 may not send a notification to the operator client 111, in which case the operator client 111 would establish that the reguest has not been approved.
[0057] If the operator client 111 is authorised, in step S507 it is determined by the recording server 151 whether the video data is to be masked by mask data. If the video data is not to be masked, in step S508 the operator client 111 receives the video data from the recording server 151. If the video data is to be masked, in step S509 the operator client 111 receives the mask data together with the video data from the recording server, and in step S510 the operator client 111 renders the mask data and the video data.
[0058] FIG. 6 is a flowchart illustrating the operation S600 of the recording server 151. In step S601, the recording server 151 receives the video data from cameras 161-161. In step S602, the recording server 151 stores the video data together with the time of capture of the video data. In step S603, the recording server 151 receives a request from the operator client 111 for video data having a capture time. The request received in step S603 corresponds to the request sent by the operator client 111 in step S501.
[0059] In step S605 it is determined by the recording server 151 whether the operator client 111 is authorised to view the video data. If the operator client 111 is not authorised to view the video data, in step S606 the recording server 151 notifies the operator client 111 that the request for video data has been declined. Alternatively, the recording server 151 may not send a notification to the operator client 111, in which case the operator client 111 would establish that the request has not been approved.
[0060] If the operator client 111 is authorised, in step S607 it is determined by the recording server 151 whether the video data is to be masked by mask data. If the video data is not to be masked, in step S608 the operator client 111 receives the video data from the recording server 151. If the video data is to be masked, in step S609 the recording server 151 obtains the mask data from the management server 130, and in step S610 the recording server 151 transmits the mask data and the video data. The obtaining of mask data in step S609 by the recording server, corresponds to the management server 130 receiving the reguest for mask data in step S407 and sending of the mask data in step S408.
[0061] Regarding step S607, the determination of whether the video data is to be masked is based on
the identity of the operator client 111.
Alternatively, the determination of whether the
video data is to be masked can be based on the identity of the viewer of the operator client 111. Furthermore, it is determined that the video data is not be masked if no mask data is stored by the management server 130, which would occur if the management client 112 has decided that no masking is to be applied to the video data.
[0062] During live viewing, the recording server 151 controls the transmission of video data from the surveillance apparatus 161-163 to the operator client 111. If mask data is to be obtained, the mask data corresponding to the current time is used. Advantageously, the live viewing of the video feed is masked, unless it has been determined that the video data is not to be masked.
[0063] During recording, the memory 230 of the recording server 151 stores the video data captured by the cameras 161-163. This coincides with the memory 230 of the management server 130 storing the corresponding mask data.
[0064] During playback, the recording server 151 retrieves the video data from the memory 230 of the recording server 151. If necessary, the recording server 151 obtains the mask data from the memory 230 of the management server 130. Advantageously, the view of the recorded video data can be restricted based on the mask data that was stored at the time of capture.
[0065] A variety of techniques for masking the video feed can be achieved, for example, using Intel Integrated Performance Primitives (IPP) (registered trademark), such as:
- applying the mask data as an opaque layer, which consequently is displayed instead of the detected object;
- color masking by setting the pixel values of the input image in the masked area to a defined color, which can be achieved by using the ippiSet method when using IPP;
- obscuring the video data by rearranging the video feed, so that the video feed appears scrambled; and
- blurring masking, by applying a box / mean filter over the pixels in the masked area, which can be achieved by using the ippiFilterBox method.
[0066] The above examples can also be realised by a computer of a system or apparatus (or devices such as a CPU or MPU) that reads out and executes a program recorded on a memory device to perform the functions of the above-described examples, and by a method, the steps of which are performed by a computer of a system or apparatus by, for example, reading out and executing a program recorded on a memory device to perform the functions of the above-described examples. For this purpose, the program is provided to the computer for example via a network or from a recording medium of various types serving as the memory device (e.g., a computer-readable medium such as a nontransitory computer-readable medium).
[0067] While the present invention has been described with reference to embodiments, it is to be understood that the invention is not limited to the disclosed embodiments. The present invention can be implemented in various forms without departing from the principal features of the
present invention. The scope of the following
claims is to be accorded the broadest
interpretation so as to encompass all such
modifications and equivalent structures and
functions .
Claims

Claims (17)

Claims
1. A surveillance method comprising:
receiving a request from an operator client to transmit video data having a capture time; and determining whether the video data is to be masked, wherein if it is determined that the video data is to be masked:
obtaining mask data that corresponds to the capture time of the requested video data; and sending the video data and the mask data to the operator client.
2. The surveillance method according to claim 1, wherein if it is determined that the video data is not to be masked, sending the video data to the operator client without sending mask data.
3. The surveillance method according to claim 1 or claim 2, wherein the determination of whether the video data is to be masked depends upon permission settings that are attributed to the operator client.
4. The surveillance method according to any preceding claim, wherein the mask data defines an area of the video data that is to be masked.
5. The surveillance method according to any preceding claim, wherein the video data is obscured by the mask data to an extent according to a predetermined parameter .
6. The surveillance method according to any preceding claim, further comprising:
setting a range of capture times for which the mask data is to mask the video data.
7. The surveillance method according to any preceding claim, further comprising determining whether the operator client is authorised to receive video data, wherein if it is determined that the operator client is authorised to receive video data, transmitting the video data to the operator client, together with the mask data if appropriate, and wherein if it is determined that the operator client is not authorised to receive video data, declining the request to transmit video data.
8. The surveillance method according to any preceding claim, wherein the mask data is obtained from a management server.
9. The surveillance method according to any preceding claim, wherein the sending of video data to the operator client occurs at the capture time.
10. The surveillance method according to any preceding claim, further comprising:
storing, in a memory, the video data together with the capture time;
retrieving, from the memory, the video data corresponding to the capture time in response to the request being received from the operator client; and transmitting to the operator client, the video data, together with the mask data if appropriate.
11. The surveillance method according to any preceding claim, further comprising:
receiving, by the operator client, the video data, together with the mask data if appropriate; and rendering, by the operator client, the video data and mask data together, so that the video data is masked according to the mask data.
12. The surveillance method according to any preceding claim, wherein the video data comprises the mask data as metadata.
13. A surveillance apparatus comprising:
a receiver configured to receive a request from an operator client to transmit video data having a capture time; and a processor configured to determine whether the video data is to be masked, wherein if it is determined that the video data is to be masked:
the surveillance apparatus obtaining mask data that corresponds to the capture time of the reguested video data; and the surveillance apparatus sending the video data and the mask data to the operator client.
14. A surveillance system comprising:
a surveillance apparatus according to claim 13;
and a management server configured to store the mask data in a memory, wherein the surveillance apparatus is configured to obtain the mask data from the memory of the management server.
15. The surveillance system according to claim 14, further comprising:
the operator client configured to reguest the transmission of video data from the surveillance apparatus, and receive the video data, together with the mask data if appropriate.
16. A program that, when implemented on a surveillance apparatus, causes the surveillance apparatus to perform a surveillance method according to any one of claims 1 to 12 .
17. A computer-readable medium storing a program according to claim 16.
GB1721420.6A 2017-12-20 2017-12-20 A surveillance method, a surveillance apparatus, a surveillance system, and a program Withdrawn GB2569572A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1721420.6A GB2569572A (en) 2017-12-20 2017-12-20 A surveillance method, a surveillance apparatus, a surveillance system, and a program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1721420.6A GB2569572A (en) 2017-12-20 2017-12-20 A surveillance method, a surveillance apparatus, a surveillance system, and a program

Publications (2)

Publication Number Publication Date
GB201721420D0 GB201721420D0 (en) 2018-01-31
GB2569572A true GB2569572A (en) 2019-06-26

Family

ID=61009047

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1721420.6A Withdrawn GB2569572A (en) 2017-12-20 2017-12-20 A surveillance method, a surveillance apparatus, a surveillance system, and a program

Country Status (1)

Country Link
GB (1) GB2569572A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022083956A1 (en) * 2020-10-23 2022-04-28 Canon Kabushiki Kaisha A computer implemented method, apparatus and computer program for privacy masking video surveillance data
GB2623325A (en) * 2022-10-11 2024-04-17 Milestone Systems As Methods of video surveillance, computer programs, storage media and video surveillance systems

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016122892A (en) * 2014-12-24 2016-07-07 株式会社日立国際電気 Video system
WO2017090892A1 (en) * 2015-11-27 2017-06-01 한화테크윈 주식회사 Osd information generation camera, osd information synthesis terminal (20), and osd information sharing system comprising same

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016122892A (en) * 2014-12-24 2016-07-07 株式会社日立国際電気 Video system
WO2017090892A1 (en) * 2015-11-27 2017-06-01 한화테크윈 주식회사 Osd information generation camera, osd information synthesis terminal (20), and osd information sharing system comprising same

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022083956A1 (en) * 2020-10-23 2022-04-28 Canon Kabushiki Kaisha A computer implemented method, apparatus and computer program for privacy masking video surveillance data
GB2600405A (en) * 2020-10-23 2022-05-04 Canon Kk A computer implemented method, apparatus and computer program for privacy masking video surveillance data
GB2623325A (en) * 2022-10-11 2024-04-17 Milestone Systems As Methods of video surveillance, computer programs, storage media and video surveillance systems

Also Published As

Publication number Publication date
GB201721420D0 (en) 2018-01-31

Similar Documents

Publication Publication Date Title
JP6442751B2 (en) Information processing apparatus, information processing system, control method, and program
US9648285B2 (en) Monitoring method and camera
US11670147B2 (en) Method and apparatus for conducting surveillance
US8233677B2 (en) Image sensing apparatus and image file data structure
US8934627B2 (en) Video event capture, storage and processing method and apparatus
US11102456B2 (en) Video encoding system and video encoding method
JP2009080668A (en) Peep prevention system and peep prevention program
KR101522311B1 (en) A carrying-out system for images of the closed-circuit television with preview function
KR101626546B1 (en) Apparatus and method for processing image information to support protection of personal information
US10755109B2 (en) Monitoring system, monitoring method, and non-transitory computer-readable storage medium
KR102233402B1 (en) Method for estimating concentration of fine dust and apparatus for executing the method
DE102015102276A1 (en) DISPLAY CONTROL DEVICE AND DISPLAY METHOD
US20190246048A1 (en) Image processing apparatus, image processing method, and storage medium
KR101951605B1 (en) Cctv image security system to prevent image leakage
GB2569572A (en) A surveillance method, a surveillance apparatus, a surveillance system, and a program
WO2020198891A1 (en) Method, recording device and computer program for verifying image and/or audio data
KR101420006B1 (en) System and Method for Camera Image Service based on Distributed Processing
KR101731592B1 (en) Multiple video monitoring system for standalone type
KR101668303B1 (en) Integrated management system for event image
CN110996010A (en) Camera, image processing method and device thereof, and computer storage medium
DE10248463A1 (en) Systems and methods for creating and implementing an image capture procedure for an image capture device
US20190228625A1 (en) Prioritization of video sources
KR101331242B1 (en) Searchable image encryption system of streaming service based on cloud computing
WO2020179052A1 (en) Image processing device, control method, and program
KR102608208B1 (en) Method, device and system for providing streaming service with improved visibility of image of interest

Legal Events

Date Code Title Description
COOA Change in applicant's name or ownership of the application

Owner name: CANON KABUSHIKI KAISHA

Free format text: FORMER OWNER: CANON EUROPA N.V.

WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)