Académique Documents
Professionnel Documents
Culture Documents
new, advanced and innovative algorithms and methods aiming at combating terrorism and other criminal activities, such as human trafficking, child pornography, detection of dangerous situations (e.g. robberies) and the use of dangerous objects (e.g. knives or guns) in public spaces, affecting citizens safety.
* Automatic threat detection and especially terroristic threats * Recognition of serious criminal behaviour or violence To recognise danger events that could lead to terrorist attacks (e.g. left luggage at an airport, automatic recognition of dangerous tools)
The partners:
INDECT has been initiated by the Polish Platform for Homeland Security. The Project proposal was submitted by the international, pan-European consortium of 17 partners, led by the AGH University of Science and Technology (Krakow, Poland), under the supervision of Professor Andrzej Dziech, the INDECT Project Coordinator. The consortium consists of 11 well-known universities, 4 companies and 2 end-users The purpose of the INDECT project is to involve European scientists and researchers in the development of solutions to and tools for automatic threat detection and criminal activities. A significant part of the project is dedicated to the development of tools and methods for data and privacy protection. The processed information is protected before its transmission or storage to prevent any attempts at unauthorized access. Dedicated tools are being developed to protect citizens privacy in areas covered by visual monitoring systems. The main tasks of INDECT can be divided into 3 categories as shown below:
The first category, Intelligent Monitoring for Threat Detection, is dedicated to the automatic detection of real world threats (video analytics).
Contemporary CCTV monitoring systems are mainly based on the continuous observation approach, where the monitored area is under constant supervision by the operator. If the operator is dishonest, this can potentially lead to privacy abuse. The research conducted within the project aims to improve the efficiency and accuracy of existing video monitoring systems. INDECT is not installing any cameras in the EU; nor is it filming people at random. It is not connected to any existing database or social network.
In the area of Threat Detection in Computer Networks the research focuses on identification of sources which distribute child pornography, or information related to the illegal trade in human organs.
The final category focuses on the development of Data and Privacy Protection techniques.,
There are two main research directions related to this category development of digital watermarking, and cryptographic algorithms. The development of new cryptographic algorithms delivers enhanced security for both data transmission and storage
Q4: Who are the members of the Project INDECT ethics board?
A human rights lawyer A professor specialized in Ethics Two police officers and one retired police officer A technical specialist Three researchers in the domain of security related technologies
Q6: Is it planned to get this observation-tool for general or will it only be used in special cases, for example to avoid terrorism or child abuse?
The INDECT Project is exceptionally oriented to avoid terrorism and serious criminal actions, also in Internet (e.g. child pornography) to increase security of citizens! We will also produce the tools for protection of personal data (using watermarking technology). It was never planned to get observation tools for general purposes..
Closed-circuit television (CCTV) is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors the term is most often applied to those used for surveillance in areas that may need monitoring such as banks, casinos, airports, military installations, and convenience stores
A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio or image data. It is typically used to identify ownership of the copyright of such signal. "Watermarking" is the process of hiding digital information in a carrier signal. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. It is prominently used for tracing copyright infringements and for banknote authentication.
INDECT applies a new approach to CCTV monitoring known as Threat Monitoring. It focuses on the detection of scenarios containing potential threats. These scenarios include the presence of dangerous objects (e.g. guns), sounds (gun shots, screaming), abandoned luggage, etc.
INDECT is developing tools for detecting illegal content (such as child pornography) and threats (such as malware/viruses) in computer networks.
An important part of the project is research on ensuring information security and personal privacy. Digital watermarking and cryptographic algorithms are the main mechanisms used for this purpose.
Application of digital watermarking for privacy protection secure access to information included in digital images
In these applications, a key role is played by personal privacy. Therefore, techniques for detecting the presence of sensitive parts of the images and then blurring them are commonly used. This technique leads to an irreversible loss of information that is potentially useful in the future. Currently, if there is a need to preserve these sensitive data, two versions of the image, with and without censorship, are recorded at the same time. The research conducted developed a technique to solve this problem. It enables sensitive areas of images to be blurred while leaving the "lost" information securely encoded directly in the same picture. This information is encoded using digital watermark technology.
All of the research activities within INDECT project are carried out so as to ensure the appropriate balance between the protection of the rights of the individual and the protection of society. INDECT research project has an Ethics Board, which was established to ensure strict compliance of research outcomes with already established rules concerning privacy, data protection.
The Ethics Board has a broad membership, designed to exert strict control over the project. It includes representatives from data protection experts, Non-Governmental Organisations, academic world, industry and the Police Service of Northern Ireland, which is generally recognised as adhering to the highest standards of human rights protection in all aspects of its work.
Tools based on INDECT research will enhance the ability of the police to protect the public .
It is important to note that a person highlighted by tools based on INDECT detection algorithms would merely be brought to the attention of the relevant authorities, so that normal lawful measures can be taken
The algorithms and methods on which INDECT project is relying are going to be protected by the national and international rules regarding privacy and the Human Rights (e.g. the Data Protection Act 1998, the Human Rights Act 1998 and the Regulation of Investigatory Powers Act 2000 in the United Kingdom).
The sentence: if you have done nothing wrong, you have nothing to fear is only true if every aspect of the criminal justice system works perfectly, on every occasion. Tools based on INDECT project research outcomes will provide EU Member States with the technology to ensure that decisions around public safety are based on the maximum amount of relevant information available.