SlideShare a Scribd company logo
1 of 13
Download to read offline
Eyes on You
Shun-Hsing Ou (歐順興)
Shao-Wen Yang (楊邵文)
10:50
6月13日週五
上午10:50
In , we saw 
M2M/IoT
Smart Home
IP Camera
Conventional IP Cameras
•  Store all videos to cloud or local storage
–  Large resource required
–  Not real-time
•  Stream all videos to mobile devices
–  Bad usability in security problem
–  Battery issue
•  Detect motion and push notification
–  To many alerts
•  Animals, wind, …
•  If you have several cameras… Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Alert!!
Eyes on You
Your Camera Gateway
Eyes on You
Event Summary
Event/Face
Detection
Face Scoring
System Design
Intel Galileo
ThroughTek IOTC
Use Case
Design Challenge
•  Low computing power
•  Noisy image
•  Profile faces
•  Bad light condition
Design Challenge
•  We design our detection algorithm
–  Bases on several criteria
•  Color
•  Position
•  Motion
•  Variance
•  Symmetry
–  Low complexity
–  Robust to partial faces, noise, and light condition
Snapshots
Eyes on You has been demo on both
MakerFaire Taipei and Computex 2014
Thank You!

More Related Content

Similar to Eyes on you

OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...
OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...
OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...
mfrancis
 
Ivisiotech A2 Tech
Ivisiotech A2 TechIvisiotech A2 Tech
Ivisiotech A2 Tech
a2tech
 

Similar to Eyes on you (20)

OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...
OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...
OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...
 
A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
A Profile of the Backoff PoS Malware that Hit 1000+ Retail BusinessesA Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
 
Forensics for the defense
Forensics for the defenseForensics for the defense
Forensics for the defense
 
Forensics for the Defense
Forensics for the DefenseForensics for the Defense
Forensics for the Defense
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defense
 
"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
 
Shoulder Surfing as future technology
Shoulder Surfing as future technologyShoulder Surfing as future technology
Shoulder Surfing as future technology
 
Ivisiotech A2 Tech
Ivisiotech A2 TechIvisiotech A2 Tech
Ivisiotech A2 Tech
 
Source2009 03.12.2009-vehcile bugs
Source2009 03.12.2009-vehcile bugsSource2009 03.12.2009-vehcile bugs
Source2009 03.12.2009-vehcile bugs
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
SECURITY SYSTEM.pptx
SECURITY SYSTEM.pptxSECURITY SYSTEM.pptx
SECURITY SYSTEM.pptx
 
CCTV and Security Products
CCTV and Security ProductsCCTV and Security Products
CCTV and Security Products
 
CCTV & Security Products
CCTV & Security ProductsCCTV & Security Products
CCTV & Security Products
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV Cameras
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
 
Security Products
Security ProductsSecurity Products
Security Products
 
Advantages of cctv camera
Advantages of cctv cameraAdvantages of cctv camera
Advantages of cctv camera
 
Surveillance in Smart Cities by GeoVision
Surveillance in Smart Cities by GeoVisionSurveillance in Smart Cities by GeoVision
Surveillance in Smart Cities by GeoVision
 
Ce hv6 module 47 spying technologies
Ce hv6 module 47 spying technologiesCe hv6 module 47 spying technologies
Ce hv6 module 47 spying technologies
 
Mee Robot, Mee mobile surveillance robot :oamnetworks
Mee Robot, Mee mobile surveillance robot :oamnetworksMee Robot, Mee mobile surveillance robot :oamnetworks
Mee Robot, Mee mobile surveillance robot :oamnetworks
 

Recently uploaded

Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
dannyijwest
 

Recently uploaded (20)

Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Danikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfDanikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
 

Eyes on you

  • 1. Eyes on You Shun-Hsing Ou (歐順興) Shao-Wen Yang (楊邵文) 10:50 6月13日週五 上午10:50
  • 2. In , we saw M2M/IoT Smart Home IP Camera
  • 3.
  • 4. Conventional IP Cameras •  Store all videos to cloud or local storage –  Large resource required –  Not real-time •  Stream all videos to mobile devices –  Bad usability in security problem –  Battery issue •  Detect motion and push notification –  To many alerts •  Animals, wind, … •  If you have several cameras… Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!! Alert!!
  • 5. Eyes on You Your Camera Gateway
  • 6. Eyes on You Event Summary Event/Face Detection Face Scoring
  • 9. Design Challenge •  Low computing power •  Noisy image •  Profile faces •  Bad light condition
  • 10. Design Challenge •  We design our detection algorithm –  Bases on several criteria •  Color •  Position •  Motion •  Variance •  Symmetry –  Low complexity –  Robust to partial faces, noise, and light condition
  • 12. Eyes on You has been demo on both MakerFaire Taipei and Computex 2014