1 / 12

Video911

Video911. Turadg Aleahmad. Scenario 1. You’re walking down 4 th street You notice a menacing figure following you She demands your wallet. You give it to her End of story. Scenario 2. You’re walking down 4 th street You notice a menacing figure following you

carrion
Download Presentation

Video911

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Video911 Turadg Aleahmad NGI Summer Research, University of California at Berkeley

  2. Scenario 1 • You’re walking down 4th street • You notice a menacing figure following you • She demands your wallet NGI Summer Research, University of California at Berkeley

  3. You give it to her • End of story NGI Summer Research, University of California at Berkeley

  4. Scenario 2 • You’re walking down 4th street • You notice a menacing figure following you • You open your mobile phone and activate Video911 NGI Summer Research, University of California at Berkeley

  5. He tries to steal your software • You inform him he is live on camera being transmitted to the police • He’s already in trouble with the Justice Department so he leaves you alone NGI Summer Research, University of California at Berkeley

  6. Motivation • Four things proliferating: • Guns • Surveillance cameras • Fast wireless • Camera-endowed mobile phones NGI Summer Research, University of California at Berkeley

  7. Now • Guns increase likelihood of violence • Ubiquitous surveillance erodes civil liberties (and doesn’t work so well) • Then what? NGI Summer Research, University of California at Berkeley

  8. With Video911 • Strictly defensive • More “Little Brother” than Big Brother NGI Summer Research, University of California at Berkeley

  9. Overview • User streams scene to secure location • Operators there monitor the situation • If the user is harmed, the operator is alerted and the device continues to transmit NGI Summer Research, University of California at Berkeley

  10. Prototype • JMF applications • RMI messaging • H.263 codec (RFC2190, RFC2429) • RTP transmission (RFC1889, RFC2198) • Let’s see it NGI Summer Research, University of California at Berkeley

  11. Evaluation • Simple idea • Open protocols • Bandwidth (PCS Vision: 70, 3G: 384) • Infrastructure NGI Summer Research, University of California at Berkeley

  12. Future • SOAP RPC • Audio channel • Switchboard interface and scalability • GPS positioning • PKS secure channel (auth + crypt, CA) • Server-side face matching • Client-side face optimization, Infrared • Privacy issues (eg. scrambling, expiring) NGI Summer Research, University of California at Berkeley

More Related