How they see you: A peek behind inner workings of AI surveillance

栏目: IT技术 · 发布时间: 5年前

How they see you: A peek behind inner workings of AI surveillance

Understanding how large scale surveillance systems are driven on edge-computing

How they see you: A peek behind inner workings of AI surveillance

Photo by Scott Webb on Unsplash

L arge scale intelligent surveillance systems used by governments and corporates have attracted a lot of bad press and public outrage over privacy and data security concerns. They often do data collection as well as data processing for extracting key insights regarding the scenes captured.

For example, these systems are alleged to do face recognition, matching, and information extraction of an individual or a group.

Data privacy and the ethical aspects of these surveillance systems are a whole other debate and beyond the scope of this article. What is more important is to be aware of what goes on behind building such a system.

Have you ever wondered how these systems work in real life? If yes, then I suggest you read on to find out.

I have been working on large scale machine vision systems for the past 2 years and through this post, I would like to share with you some insights I gained while working on some projects which required me to architect systems involving 200+ cameras that need to be processed in realtime using an AI backend.

The methods or knowledge I share are purely based on my learning and hands-on experience that I had and should not be considered as me saying its the absolute best practice or this is how every surveillance system out there works. Rather, it is a general template that showcases the potential of such pipelines and how the data gets handle in most scenarios.

How they see you: A peek behind inner workings of AI surveillance

Photo by Lianhao Qu on Unsplash

So how does it all come together? To broadly put things to perspective, you have the cameras acting as the sensory aid for raw data capture, an artificial intelligence processing unit that could either be an edge computing device or a central processing server, a command center or control dashboard, typical networking infrastructure to stream the sensory data and a database to store all the vital info.


以上所述就是小编给大家介绍的《How they see you: A peek behind inner workings of AI surveillance》,希望对大家有所帮助,如果大家有任何疑问请给我留言,小编会及时回复大家的。在此也非常感谢大家对 码农网 的支持!

查看所有标签

猜你喜欢:

本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们

加密与解密(第4版)

加密与解密(第4版)

段钢 / 电子工业出版社 / 2018-10-1 / 198

《加密与解密(第4版)》以加密与解密为切入点,讲述了软件安全领域的基础知识和技能,如调试技能、逆向分析、加密保护、外壳开发、虚拟机设计等。这些知识彼此联系,读者在掌握这些内容之后,很容易就能在漏洞分析、安全编程、病毒分析、软件保护等领域进行扩展。从就业的角度来说,掌握加密与解密的相关技术,可以提高自身的竞争能力;从个人成长的角度来说,研究软件安全技术有助于掌握一些系统底层知识,是提升职业技能的重要......一起来看看 《加密与解密(第4版)》 这本书的介绍吧!

XML 在线格式化
XML 在线格式化

在线 XML 格式化压缩工具

UNIX 时间戳转换
UNIX 时间戳转换

UNIX 时间戳转换

RGB HSV 转换
RGB HSV 转换

RGB HSV 互转工具