Welcome to INDECT homepage — indect-home
►http://www.indect-project.eu
#surveillance
#indect
he INDECT project adopts a new approach based on threat monitoring (also known as “black/dark screen monitoring”). In contrast to the traditional approach, it focuses on potentially threatening situations, and gives the operator access to the video only when his attention is actually needed. The system automatically detects dangerous events and alerts the operator, who makes the final decision about the action that needs to be taken. The process is carried out in accordance with all relevant regulations .
The research conducted within the project aims to improve the efficiency and accuracy of existing video monitoring systems.
INDECT is not installing any cameras in the EU; nor is it filming people at random. It is not connected to any existing database or social network.
In the area of “Threat Detection in Computer Networks” the research focuses on identification of sources which distribute child pornography, or information related to the illegal trade in human organs.
One of the main tools developed within this category is INACT, a system for rapid detection of child pornography on storage devices (mainly hard drives) captured by police forces on the basis of a warrant. INACT is especially useful if the illegal content is hidden in large data volumes.
The final category focuses on the development of “Data and Privacy Protection” techniques.,
There are two main research directions related to this category – development of digital watermarking, and cryptographic algorithms. The digital watermarks are used to secure multimedia content against malicious tampering, and to provide a novel privacy protection mechanism. The approach adopted enables sensitive information, such as faces or license number plates, to be collected and displayed to authorized system users only.
The development of new cryptographic algorithms delivers enhanced security for both data transmission and storage. A modern symmetric cipher has been designed, verified, and implemented both in software and hardware. This research also addresses the potential of adopting quantum cryptography to further improve the security of the solutions developed.