Privacy Protection in a Video Surveillance System

  • Andrew SeniorEmail author


This chapter presents mechanisms for privacy protection in a distributed, multicamera surveillance system. The design choices and alternatives for providing privacy protection while delivering meaningful surveillance data for security and retail environments are described, followed by performance metrics to evaluate theeffectiveness of privacy protection measures and experiments to evaluate these in retail store video. This chapter concludes with a discussion including five principles for data presentation of privacy protection systems.


False Alarm Surveillance System Video Surveillance Privacy Protection Video Surveillance System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bowyer, K.: Face recognition technology and the security versus privacy tradeoff. Technology and Society, pp.9–20 (2004)Google Scholar
  2. 2.
    Brassil, J.: Using mobile communications to assert privacy from video surveillance. In: 19th IEEE International Parallel and Distributed Processing Symposium, p. 290a (2005)Google Scholar
  3. 3.
    Brin, D.: The Transparent Society: Technology Force Us to Choose Between Privacy and Freedom. Perseus Publishing (1999)Google Scholar
  4. 4.
    Cavallaro, A.: Adding privacy constraints to video-based applications. In: European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology (2004)Google Scholar
  5. 5.
    Cavallaro, A.: Privacy in video surveillance. Signal Processing Magazine, pp.166–168 (2007)Google Scholar
  6. 6.
    Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP Journal on Applied Signal Processing, p.107 (2007)Google Scholar
  7. 7.
    Cheung, S., Paruchuri, J., Nguyen, T.: Managing privacy data in pervasive camera networks. In: Proceedings of International Conference on Image Processing (2008)Google Scholar
  8. 8.
    Chinomi, K., Nitta, N., Ito, Y., Babaguchi, N.: PriSurv: Privacy protected video surveillance system using adaptive visual abstraction. In: International Multimedia Modelling Conference, pp. 144–154 (2008)Google Scholar
  9. 9.
    Coutaz, J., Bérard, F., Carraux, E., Astier, W., Crowley, J.: CoMedi: Using computer vision to support awareness and privacy in mediaspaces. In: CHI, pp. 13–14. ACM Press (1999)Google Scholar
  10. 10.
    Dufaux, F., Ebrahimi, T.: Smart video surveillance system preserving privacy. In: SPIE Image and Video Communication and Processing (2005)Google Scholar
  11. 11.
    Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Proceedings of Computer Vision and Pattern Recognition, p. 160 (2006)Google Scholar
  12. 12.
    Fan, J., Hacid, M.S., Bertino, E.: A novel approach for privacy preserving video sharing. In: CIKM. ACM (2005)Google Scholar
  13. 13.
    Fidaleo, D., Nguyen, H.A., Trivedi, M.: The networked sensor tapestry NeST: A privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In: ACM International Workshop on Video Surveillance and Sensor Networks (2004)Google Scholar
  14. 14.
    Gross, R., Airoldi, E., Malin, B., Sweeney, L.: Integrating utility into face de-identification. In: Workshop on Privacy Enhancing Technologies. CMU (2005)Google Scholar
  15. 15.
    Gross, R., Sweeney, L., dela Torre, F., Baker, S.: Model-based face de-identification. In: Workshop on Privacy Research in Vision. IEEE (2006)Google Scholar
  16. 16.
    Hayes, G., Abowd, G.: Tensions in designing capture technologies for an evidence-based care community. In: CHI (2006)Google Scholar
  17. 17.
    Kitahara, I., Kogure, K., Hagita, N.: Stealth vision for protecting privacy. In: Proceedings of the International Conference on Pattern Recognition, vol.4 (2004)Google Scholar
  18. 18.
    Koshimizu, T., Toriyama, T., Babaguchi, N.: Factors on the sense of privacy in video surveillance. In: Proceedings of the 3rd ACM workshop on Continuous archival and retrival of personal experences, pp. 35–44. ACM (2006).
  19. 19.
    Koshimizu, T., Toriyama, T., Noboru, B.: Factors on the sense of privacy in video surveillance. In: 3rd ACM Workshop on Continuous Archival and Retrival of Personal Experiences, pp.35–44 (2006)Google Scholar
  20. 20.
    Martínez-Ponte, I., Desurmont, X., Meesen, J., Delaigle, J.F.: Robust human face hiding ensuring privacy. In: International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) (2005)Google Scholar
  21. 21.
    McCahill, M., Norris, C.: CCTV. Perpetuity Press (2003)Google Scholar
  22. 22.
    Neustaedter, C., Greenberg, S., Boyle, M.: Blur filtration fails to preserve privacy for home-based video conferencing. In: ACM Transactions on Computer Human Interactions (2006)Google Scholar
  23. 23.
    Newton, E., Sweeney, L., Malin, B.: Preserving privacy by de-identifying facial images. Tech. Rep. CMU-CS-03-119, Carnegie Mellon University, School of Computer Science, Pittsburgh (2003)Google Scholar
  24. 24.
    Pankanti, S., Senior, A., Brown, L., Hampapur, A., Tian, Y.L., Bolle, R.: Work in progress: PeopleVision: Privacy protection in visual surviellance. IEEE Pervasive Computing 2(1), 96 (2003)CrossRefGoogle Scholar
  25. 25.
    Schiff, J., Meingast, M., Mulligan, D., Sastry, S., Goldberg, K.: Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In: International Conference on Intelligent Robots and Systems (2007)Google Scholar
  26. 26.
    Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A.: Blinkering surveillance: Enabling video privacy through computer vision. Tech. Rep. RC22886, IBM T.J.Watson Research Center, NY 10598 (2003)Google Scholar
  27. 27.
    Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A.: Enabling video privacy through computer vision. IEEE Security and Privacy 3(5), 50–57 (2004)Google Scholar
  28. 28.
    Tansuriyavong, S., Hanaki, S.: Privacy protection by concealing persons in circumstantial video image. In: Workshop on Perceptive User Interfaces, pp. 1–4. ACM (2001)Google Scholar
  29. 29.
    Teng, C.Y., Wang, K.C., Chu, H.H.: Privacy-aware camera: Automating the removal of accidental passers from unintentional cameras. Submitted to Location Awareness Workshop 2nd International Workshop on Location-and Context-Awareness (LoCA 2006)Google Scholar
  30. 30.
    Wickramasuriya, J., Alhazzazi, M., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy-protecting video surveillance. In: SPIE Real-Time Imaging IX, vol. 5671, pp. 64–75 (2005)Google Scholar
  31. 31.
    Zhang, W., Cheung, S.C., Chen, M.: Hiding privacy information in video surveillance system. In: Proceedings of International Conference on Image Processing (2005)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  1. 1.Google ResearchNew YorkUSA

Personalised recommendations