User-Centric Protection and Privacy in Smart Surveillance Systems
During the last decades surveillance systems developed from analog one camera one monitor systems to highly complex distributed systems with heterogeneous sensors that can handle surveillance tasks autonomously. With raising power and complexity, ensuring privacy became a key challenge. An event-driven SOA architecture that follows the privacy by design principle is a promising approach to realize a smart surveillance system and is described in this work.
Enforcement of privacy is not only complex for engineers and system designers; rather it is not understandable for the average user, who cannot even assess potentials and limitations of smart surveillance systems. This work presents an approach for privacy that is focused on the user, i.e., the observed subject. By using a mobile device the user can interact with the surveillance system and is not passive anymore, as in conventional surveillance deployments. This restores the balance between the observed and the observers, enhances transparency and will raise the acceptance of surveillance technology.
In the highlighted approach the user can control his individual-related data and privacy preferences and can use services that are beneficial for him.
KeywordsSurveillance System Video Stream Gesture Recognition Privacy Protection Video Surveillance System
Unable to display preview. Download preview PDF.
- 1.Hempel, L., Töpfer, E.: CCTV in Europe. Final Report, Urbaneye Working Paper No. 15 (August 2004)Google Scholar
- 2.Regazzoni, C.S., Fabri, G., Vernazza, G.: Advanced video-based surveillance systems, vol. 488. Springer (1999)Google Scholar
- 3.Remagnino, P.: Video-based surveillance systems: computer vision and distributed processing. Springer, Netherlands (2002)Google Scholar
- 4.Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Computer Vision and Pattern Recognition Workshop (CVPRW 2006), p. 160. IEEE (2006)Google Scholar
- 5.Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 65–89. Springer (2009)Google Scholar
- 7.Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Security & Privacy 3, 50–57 (2005)Google Scholar
- 9.Bagüés, S., Zeidler, A., Klein, C., Valdivielso, C., Matias, I.: Enabling personal privacy for pervasive computing environments. Journal of Universal Computer Science 16(3), 341–371 (2010)Google Scholar
- 10.Moßgraber, J., Reinert, F., Vagts, H.: An architecture for a task-oriented surveillance system – a service and event based approach. In: Fifth International Conference on Systems ICONS (April 2010)Google Scholar
- 11.Bauer, A., Emter, T., Vagts, H., Beyerer, J.: Object oriented world model for surveillance systems. In: Elsner, P. (ed.) Future Security: 4th Security Research Conference, pp. 339–345. Fraunhofer Verlag (October 2009)Google Scholar
- 12.Vagts, H., Krempel, E., Beyerer, J.: Privacy enforcement by identity management in smart surveillance systems. In: Proceedings of the International Conference on Distributed Multimedia Systems. Knowledge Systems Institute Graduate School, vol. 16, pp. 64–69 (October 2010)Google Scholar
- 13.Vagts, H., Krempel, E., Fischer, Y.: Access controls for privacy protection in pervasive environments. In: The 3rd Workshop on Privacy and Security in Pervasive Environments PSPAE (2011)Google Scholar
- 14.Vagts, H., Bier, C., Beyerer, J.: Anonymization in intelligent surveillance systems. In: 2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–4. IEEE (2011)Google Scholar