共查询到19条相似文献,搜索用时 93 毫秒
1.
近年来,随着电视技术从传统的模拟方式向数字方式转变,电子技术、数字图像处理技术以及计算机多媒体技术的飞速发展,监控录像经过了从模拟监控系统到数字监控系统的发展,同时由于网络技术的不断发展,宽广的网络宽带,使得图像网络实时传输、图像自动识别以及数字记录等成为可能,网络远程监控系统也应运而生,具有便于集中管理、节约成本,灵活集成,操作方便等优势,在公安、金融、司法等部门都得到很好地运用. 相似文献
2.
3.
4.
山东省龙口市公安局投入资金建成一套道路视频监控系统,该系统多次在案件侦破中发挥重要作用。2008年春节前夕,侦查人员在办理一起系列撬盗保险柜案件时,逭过调阅监控录像锁定了犯罪嫌疑人所驾汽车,顺藤摸瓜将5名盗窃团伙成员全部抓获,带破案件68起,涉案金额47万余元。 相似文献
5.
6.
7.
8.
目前,公安实践部门对视频监控录像的分析仍依赖传统的人工分析法,视频监控录像智能化分析的理念及方法尚不普及,软硬件技术应用尚不成熟。本文针对视频监控录像智能化分析的现状,从理论层面将传统人工分析法与智能化分析法进行对比分析,并对智能化分析的应用条件、应用前景加以阐述。 相似文献
9.
长期以来,铁路运输货物被盗案件时有发生,由于货物列车运行具有线长点多的特点,往往难于确定案件的发生区段。近年来,铁路在每个公安机构分界口建立一个货车动态视频监控点,对运行的货物列车的装载和施封情况进行动态监控,从中发现货物被盗车辆,以此判定货盗案件发生区段。然而监控点由于受夜间、雨雪、灯光、列车通过速度等因素影响, 相似文献
10.
11.
12.
根据车辆速度计算公式,提出了两种基于监控视频测速的思路。一是视频图像与实地测量相结合,车辆运动距离通过与监控画面匹配后实地测量,运动时间通过视频帧率运算分别获得。二是利用车辆技术参数测量,在视频图像中,车身前后明显部位经过同一点,车辆运动距离和时间分别通过被测车型技术参数、视频帧率运算获得。并通过实验结果对两种方法进行评价。 相似文献
13.
David Wright Michael Friedewald Serge Gutwirth Marc Langheinrich Emilio Mordini Rocco Bellanova Paul De Hert Kush Wadhwa Didier Bigo 《Computer Law & Security Report》2010
Surveillance is becoming ubiquitous in our society. We can also see the emergence of “smart” surveillance technologies and the assemblages (or combinations) of such technologies, supposedly to combat crime and terrorism, but in fact used for a variety of purposes, many of which are intrusive upon the privacy of law-abiding citizens. Following the dark days of 9/11, security and surveillance became paramount. More recently, in Europe, there has been a policy commitment to restore privacy to centre stage. This paper examines the legal tools available to ensure that privacy and personal data protection are respected in attempts to ensure the security of our society, and finds that improvements are needed in our legal and regulatory framework if privacy is indeed to be respected by law enforcement authorities and intelligence agencies. It then goes on to argue that privacy impact assessments should be used to sort out the necessity and proportionality of security and surveillance programmes and policies vis-à-vis privacy. 相似文献
14.
论视频监控的犯罪预防功能及犯罪侦查价值 总被引:1,自引:0,他引:1
各国的犯罪预防理论发展至今,已经形成了比较完善的犯罪预防体系,主要包括司法预防、社会预防和情景预防三种模式。在我国的犯罪预防体系中,向来重视司法预防和社会预防,而对情景预防关注不够,情景预防措施尚不完善。作为一种对犯罪的干预,视频监控是一种对情境犯罪的干预,研究发掘其在犯罪预防中的作用对完善犯罪预防体系具有重要意义。同时,视频监控系统在犯罪侦查方面也具有重要作用。 相似文献
15.
李延舜 《法律科学-西北政法大学学报》2019,(3):54-63
作为一种技术性侦查和创新性管理工具的公共视频监控,正日益受到政府青睐,民众对安全感的渴求也助推了这股浪潮。但正如硬币有两面,公共视频监控带来的负面效应正在显现,公民隐私在监控社会中无所遁形,公民正在被分类、正在失去个性、自由,公民的私人领域被进一步压缩。面对可能到来的\"极权社会\"的威胁,必须通过隐私权框架来规制公共视频监控。这种规制由三个方面组成:以数据隐私保护为前提的公共视频监控的合法化、以公众参与和监督为核心的透明性以及以隐私侵权责任承担为保障的公共视频监控的问责制。唯有如此,才能避免公共视频监控与公民隐私权的尖锐对立。 相似文献
16.
Boštjan Berčič Carlisle George 《International Review of Law, Computers & Technology》2009,23(3):189-201
Information science distinguishes between the semantic forms/intangibles of data, information and knowledge. Data (e.g. an attribute of a data record in a relational database) does not have any meaning by itself. Information is data brought into context (e.g. data related to its primary key), and knowledge is the collection of information for useful intent (e.g. a database). This paper investigates the mapping of semantic forms in information science (i.e. data, information, knowledge) to correlative concepts in information law (primarily data protection legislation) with a view to investigating how such semantic forms are legally protected. The paper first proposes a data, information, knowledge, rules (DIKR) hierarchy in the context of relational database theory, and interprets this hierarchy with respect to data protection concepts. The paper then gives an in-depth discussion of the elements of the DIKR hierarchy (data, information, knowledge, deduced knowledge, induced knowledge) and how they relate to the EU Data Protection Directive 95/46/EC. These relationships are summarized in the form of a two dimensional correlation matrix. Finally the paper discusses how the semantic forms identified are protected under the EU Data Protection Directive, and gives insightful observations about the connection between information law and information science. 相似文献
17.
目的对当前我国电子物证检验中提取到的海量数据信息的取证难题进行探讨。方法对数据文件中海量数据信息的特点及其传统取证方法进行分析研究。结果提出开发专用工具软件进行海量数据文件的提取。结论利用专用提取工具软件可以对常见数据文件中有规律性的数据内容进行读取、计算、查重和汇总,使海量涉案数据文件的检验从传统的人工方式转变为计算机的自动处理。 相似文献
18.
Gloria González Fuster Raphaël Gellert 《International Review of Law, Computers & Technology》2012,26(1):73-82
The entry into force of the EU Charter of Fundamental Rights and the ensuing introduction of the right to data protection as a new fundamental right in the legal order of the EU has raised some challenges. This article is an attempt to bring clarity on some of these questions. We will therefore try to address the issue of the place of the right to the protection of personal data within the global architecture of the Charter, but also the relationship between this new fundamental right and the already existing instruments. In doing so, we will analyse the most pertinent case law of the Court of Luxembourg, only to find out that it creates more confusion than clarity. The lesson we draw from this overview is that the reasoning of the Court is permeated by a ‘privacy thinking’, which consists not only in overly linking the rights to privacy and data protection, but also in applying the modus operandi of the former to the latter (which are different we contend). The same flawed reasoning seems to be at work in the EU Charter of Fundamental Rights. Therefore, it is crucial that the different modi operandi be acknowledged, and that any upcoming data protection instrument is accurately framed in relation with Article 8 of the Charter. 相似文献
19.
Business Registers (BRs) are a very important information resource for investors, creditors, financial institutions and public authorities. The possibility to aggregate and interconnect these data at a European level could enhance the transparency of companies towards those actors and add a great deal of value to the raw Business Register data. The European BRITE project intended to provide adequate tools to meet these demands. BRITE will provide easier access and cross-border interoperability of Business Register data throughout Europe. On the other hand, the processing of BR data within the BRs and BRITE triggers several important European legislations such as the Data Protection Directive and the Directive on the re-use of public sector information. In this paper, the processing of BR data will be analysed from the perspective of both data protection and public sector information laws, analysing as well the relation between both regulations. Do these regulations strike an optimal balance between the interests of private data vendors to re-use BR data and enhance business transparency and the need to protect the personal data of natural persons? 相似文献