Skip to main content

Object Video Streams: A Framework for Preserving Privacy in Video Surveillance

  • Chapter
  • 1192 Accesses

Abstract

Here we introduce a framework for preserving privacy in video surveillance. Raw video footage is decomposed into a background and one or more object-video streams. Such object-centric decomposition of the incoming video footage opens up new possibilities to provide visual surveillance of an area without compromising the privacy of the individuals present in that area. Object-video streams allow us to render the scene in a variety of ways: (1) individuals in the scene can be represented as blobs, obscuring their identities; (2) foreground objects can be color coded to convey subtle scene information to the operator, again without revealing the identities of the individuals present in the scene; (3) the scene can be partially rendered, that is, revealing the identities of some individuals, while preserving the anonymity of others, etc. We evaluate our approach in a virtual train station environment populated by autonomous, lifelike virtual pedestrians. We also demonstrate our approach on real video footage. Lastly, we show that Microsoft Kinect sensor can be used to decompose the incoming video footage into object-video streams.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    This chapter is based upon our paper that appeared in the 6th International Conference on Advanced Video and Signal Based Surveillance in 2009 [16].

  2. 2.

    This assumption sometimes breaks due to the limitations of video processing routines, such as background subtraction, object tracking, image segmentation, etc. Still under favorable conditions—good lighting, sparsely populated scenes, etc.—it is possible to decompose the video into object-video streams as we show later in the chapter.

References

  1. Arandjelovic, O.D., Cipolla, R.: Face recognition from video using the generic shape-illumination manifold. In: Proc. European Conference on Computer Vision (ECCV06), Graz, Austria, vol. 4, pp. 27–40 (2006)

    Google Scholar 

  2. Berger, A.M.: Privacy mode for acquisition cameras and camcorders. US Patent 6,067,399 to Sony Corp., Patent and Trademark Office, 2000

    Google Scholar 

  3. Bourdev, L., Brandt, J.: Robust object detection via soft cascade. In: Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR05), San Diego, CA, vol. 2, pp. 236–243 (2005)

    Google Scholar 

  4. Bradski, G., Kaehler, A.: Learning OpenCV: Computer Vision with the OpenCV Library. O’Reilly Media, Beijing (2008)

    Google Scholar 

  5. Chattopadhyay, A., Boult, T.E.: PrivacyCam: a privacy preserving camera using uCLinux on the Blackfin DSP. In: Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR07), Minneapolis, MN, pp. 1–8 (2007)

    Google Scholar 

  6. Chen, H.-T., Lin, H.-H., Liu, T.-L.: Multi-object tracking using dynamical graph matching. In: Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR01), Hawaii, vol. 2, pp. 210–217 (2001)

    Google Scholar 

  7. Dornaika, F., Ahlberg, J.: Fast and reliable active appearance model search for 3-d face tracking. IEEE Trans. Syst. Man Cybern., Part B, Cybern. 34(4), 1838–1853 (2004)

    Article  Google Scholar 

  8. Fan, J., Luo, H., Hacid, M.-S., Bertino, E.: A novel approach for privacy-preserving video sharing. In: Proc. 14th ACM International Conference on Information and Knowledge Management (CIKM05), pp. 609–616. ACM, New York (2005)

    Google Scholar 

  9. Kim, K., Chalidabhongse, T.H., Harwood, D., Davis, L.: Real-time foreground-background segmentation using codebook model. Real-Time Imaging 11, 167–256 (2005)

    Article  Google Scholar 

  10. Kirkup, M., Carrigan, M.: Video surveillance research in retailing: ethical issues. Int. J. Retail Distrib. Manag. 28(11), 470–480 (2000)

    Article  Google Scholar 

  11. Moser, T., Nelson, D., Williams, R., Rowe, R.: Casino patron tracking and information use. US Patent WO/2008/067212, June 2008

    Google Scholar 

  12. Nieto, M., Johnston-Dodds, K., Wear Simmons, C.: Public and Private Applications of Video Surveillance and Biometric Technologies. California Research Bureau, California State Library, Bureau (2002)

    Google Scholar 

  13. Norris, C., McCahill, M., Wood, D.: The growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space. Surveill. Soc. 2, 110–135 (2004)

    Google Scholar 

  14. Ogden, J.M., Adelson, E.H., Bergen, J.R., Burt, P.J.: Pyramid-based computer graphics. Technical report RCA Engineer 30-5, RCA Corporation (September 1985)

    Google Scholar 

  15. OpenKinect. http://openkinect.org/wiki/Main_Page. Last accessed 28 May 2012

  16. Qureshi, F.Z.: Object-video streams for preserving privacy in video surveillance. In: Proc. 6th International Conference on Advanced Video and Signal Based Surveillance (AVSS09), Genovo, Italy, pp. 1–8 (2009)

    Google Scholar 

  17. Qureshi, F.Z., Terzopoulos, D.: Smart camera networks in virtual reality. Proc. IEEE (Special Issue on Smart Cameras) 96(10), 1640–1656 (2008)

    Google Scholar 

  18. Saini, M., Atrey, P.K., Mehrotra, S., Emmanuel, S., Kankanhalli, M.: Privacy modeling for video data publication. In: Proc. IEEE International Conference on Multimedia and Expo (ICME), Singapore, pp. 60–65 (2010)

    Google Scholar 

  19. Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.: Adaptive transformation for robust privacy protection in video surveillance. Adv. Multimed. 2012, 1–14 (2012)

    Article  Google Scholar 

  20. Saini, M., Atrey, P., Mehrotra, S., Kankanhalli, M.: W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video. Multimed. Tools Appl. 1–24 (2012)

    Google Scholar 

  21. Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: detecting visual markers in real-time to address privacy concerns. In: Proc. IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS07), San Diego, CA, pp. 971–978 (2007)

    Chapter  Google Scholar 

  22. Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.-l., Ekin, A.: Blinkering surveillance: enabling video privacy through computer vision. Technical report, IBM, NY (2003)

    Google Scholar 

  23. Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.-L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Trans. Secur. Priv. 3(3), 50–57 (2005)

    Article  Google Scholar 

  24. Shao, W., Terzopoulos, D.: Autonomous pedestrians. Graph. Models. 69(5–6), 246–274 (2007)

    Article  Google Scholar 

  25. Toyama, K., Krumm, J., Brumitt, B., Meyers, B.: Wallflower: principles and practice of background maintenance. In: Proc. IEEE International Conference on Computer Vision (ICCV99), Kerkyra, Greece, vol. 1, pp. 255–261 (1999)

    Chapter  Google Scholar 

  26. Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR01), Hawai, pp. 1–8 (2001).

    Google Scholar 

  27. Wada, J., Wakiyama, K., Kogane, H., Takada, N.: Monitor camera system and method of displaying pictures from monitor camera thereof. European Patent EP 1 081 955 A3 to Matsushita Electric Industrial, European Patent Office, 2001

    Google Scholar 

  28. Wu, B., Nevatia, R.: Detection of multiple, partially occluded humans in a single image by Bayesian combination of edgelet part detectors. In: Proc. Tenth IEEE International Conference on Computer Vision (ICCV05), Beijing, China, vol. 1, pp. 90–97 (2005)

    Google Scholar 

Download references

Acknowledgements

We thank Wei Shao and Mauricio Plaza-Villegas for their invaluable contributions to the implementation of the Penn Station simulator. We also thank Jordan Stadler for his work on constructing object-video streams using Microsoft Kinect sensor. This work is supported in part by the UOIT Startup Fund. We also acknowledge the NSERC Discovery Grant program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Faisal Z. Qureshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Qureshi, F.Z. (2013). Object Video Streams: A Framework for Preserving Privacy in Video Surveillance. In: Atrey, P., Kankanhalli, M., Cavallaro, A. (eds) Intelligent Multimedia Surveillance. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41512-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41512-8_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41511-1

  • Online ISBN: 978-3-642-41512-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics