Skip to main content

Privacy Protection in a Video Surveillance System

  • Chapter

Abstract

This chapter presents mechanisms for privacy protection in a distributed, multicamera surveillance system. The design choices and alternatives for providing privacy protection while delivering meaningful surveillance data for security and retail environments are described, followed by performance metrics to evaluate theeffectiveness of privacy protection measures and experiments to evaluate these in retail store video. This chapter concludes with a discussion including five principles for data presentation of privacy protection systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. Bowyer, K.: Face recognition technology and the security versus privacy tradeoff. Technology and Society, pp.9–20 (2004)

    Google Scholar 

  2. Brassil, J.: Using mobile communications to assert privacy from video surveillance. In: 19th IEEE International Parallel and Distributed Processing Symposium, p. 290a (2005)

    Google Scholar 

  3. Brin, D.: The Transparent Society: Technology Force Us to Choose Between Privacy and Freedom. Perseus Publishing (1999)

    Google Scholar 

  4. Cavallaro, A.: Adding privacy constraints to video-based applications. In: European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology (2004)

    Google Scholar 

  5. Cavallaro, A.: Privacy in video surveillance. Signal Processing Magazine, pp.166–168 (2007)

    Google Scholar 

  6. Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP Journal on Applied Signal Processing, p.107 (2007)

    Google Scholar 

  7. Cheung, S., Paruchuri, J., Nguyen, T.: Managing privacy data in pervasive camera networks. In: Proceedings of International Conference on Image Processing (2008)

    Google Scholar 

  8. Chinomi, K., Nitta, N., Ito, Y., Babaguchi, N.: PriSurv: Privacy protected video surveillance system using adaptive visual abstraction. In: International Multimedia Modelling Conference, pp. 144–154 (2008)

    Google Scholar 

  9. Coutaz, J., Bérard, F., Carraux, E., Astier, W., Crowley, J.: CoMedi: Using computer vision to support awareness and privacy in mediaspaces. In: CHI, pp. 13–14. ACM Press (1999)

    Google Scholar 

  10. Dufaux, F., Ebrahimi, T.: Smart video surveillance system preserving privacy. In: SPIE Image and Video Communication and Processing (2005)

    Google Scholar 

  11. Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Proceedings of Computer Vision and Pattern Recognition, p. 160 (2006)

    Google Scholar 

  12. Fan, J., Hacid, M.S., Bertino, E.: A novel approach for privacy preserving video sharing. In: CIKM. ACM (2005)

    Google Scholar 

  13. Fidaleo, D., Nguyen, H.A., Trivedi, M.: The networked sensor tapestry NeST: A privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In: ACM International Workshop on Video Surveillance and Sensor Networks (2004)

    Google Scholar 

  14. Gross, R., Airoldi, E., Malin, B., Sweeney, L.: Integrating utility into face de-identification. In: Workshop on Privacy Enhancing Technologies. CMU (2005)

    Google Scholar 

  15. Gross, R., Sweeney, L., dela Torre, F., Baker, S.: Model-based face de-identification. In: Workshop on Privacy Research in Vision. IEEE (2006)

    Google Scholar 

  16. Hayes, G., Abowd, G.: Tensions in designing capture technologies for an evidence-based care community. In: CHI (2006)

    Google Scholar 

  17. Kitahara, I., Kogure, K., Hagita, N.: Stealth vision for protecting privacy. In: Proceedings of the International Conference on Pattern Recognition, vol.4 (2004)

    Google Scholar 

  18. Koshimizu, T., Toriyama, T., Babaguchi, N.: Factors on the sense of privacy in video surveillance. In: Proceedings of the 3rd ACM workshop on Continuous archival and retrival of personal experences, pp. 35–44. ACM (2006). http://doi.acm.org/10.1145/1178657.1178665

  19. Koshimizu, T., Toriyama, T., Noboru, B.: Factors on the sense of privacy in video surveillance. In: 3rd ACM Workshop on Continuous Archival and Retrival of Personal Experiences, pp.35–44 (2006)

    Google Scholar 

  20. Martínez-Ponte, I., Desurmont, X., Meesen, J., Delaigle, J.F.: Robust human face hiding ensuring privacy. In: International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) (2005)

    Google Scholar 

  21. McCahill, M., Norris, C.: CCTV. Perpetuity Press (2003)

    Google Scholar 

  22. Neustaedter, C., Greenberg, S., Boyle, M.: Blur filtration fails to preserve privacy for home-based video conferencing. In: ACM Transactions on Computer Human Interactions (2006)

    Google Scholar 

  23. Newton, E., Sweeney, L., Malin, B.: Preserving privacy by de-identifying facial images. Tech. Rep. CMU-CS-03-119, Carnegie Mellon University, School of Computer Science, Pittsburgh (2003)

    Google Scholar 

  24. Pankanti, S., Senior, A., Brown, L., Hampapur, A., Tian, Y.L., Bolle, R.: Work in progress: PeopleVision: Privacy protection in visual surviellance. IEEE Pervasive Computing 2(1), 96 (2003)

    Article  Google Scholar 

  25. Schiff, J., Meingast, M., Mulligan, D., Sastry, S., Goldberg, K.: Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In: International Conference on Intelligent Robots and Systems (2007)

    Google Scholar 

  26. Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A.: Blinkering surveillance: Enabling video privacy through computer vision. Tech. Rep. RC22886, IBM T.J.Watson Research Center, NY 10598 (2003)

    Google Scholar 

  27. Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A.: Enabling video privacy through computer vision. IEEE Security and Privacy 3(5), 50–57 (2004)

    Google Scholar 

  28. Tansuriyavong, S., Hanaki, S.: Privacy protection by concealing persons in circumstantial video image. In: Workshop on Perceptive User Interfaces, pp. 1–4. ACM (2001)

    Google Scholar 

  29. Teng, C.Y., Wang, K.C., Chu, H.H.: Privacy-aware camera: Automating the removal of accidental passers from unintentional cameras. Submitted to Location Awareness Workshop 2nd International Workshop on Location-and Context-Awareness (LoCA 2006)

    Google Scholar 

  30. Wickramasuriya, J., Alhazzazi, M., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy-protecting video surveillance. In: SPIE Real-Time Imaging IX, vol. 5671, pp. 64–75 (2005)

    Google Scholar 

  31. Zhang, W., Cheung, S.C., Chen, M.: Hiding privacy information in video surveillance system. In: Proceedings of International Conference on Image Processing (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrew Senior .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Senior, A. (2009). Privacy Protection in a Video Surveillance System. In: Senior, A. (eds) Protecting Privacy in Video Surveillance. Springer, London. https://doi.org/10.1007/978-1-84882-301-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-84882-301-3_3

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84882-300-6

  • Online ISBN: 978-1-84882-301-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics