User-Centric Protection and Privacy in Smart Surveillance Systems

  • Hauke Vagts
  • Erik Krempel
  • Jürgen Beyerer
Part of the Communications in Computer and Information Science book series (CCIS, volume 318)


During the last decades surveillance systems developed from analog one camera one monitor systems to highly complex distributed systems with heterogeneous sensors that can handle surveillance tasks autonomously. With raising power and complexity, ensuring privacy became a key challenge. An event-driven SOA architecture that follows the privacy by design principle is a promising approach to realize a smart surveillance system and is described in this work.

Enforcement of privacy is not only complex for engineers and system designers; rather it is not understandable for the average user, who cannot even assess potentials and limitations of smart surveillance systems. This work presents an approach for privacy that is focused on the user, i.e., the observed subject. By using a mobile device the user can interact with the surveillance system and is not passive anymore, as in conventional surveillance deployments. This restores the balance between the observed and the observers, enhances transparency and will raise the acceptance of surveillance technology.

In the highlighted approach the user can control his individual-related data and privacy preferences and can use services that are beneficial for him.


Surveillance System Video Stream Gesture Recognition Privacy Protection Video Surveillance System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Hempel, L., Töpfer, E.: CCTV in Europe. Final Report, Urbaneye Working Paper No. 15 (August 2004)Google Scholar
  2. 2.
    Regazzoni, C.S., Fabri, G., Vernazza, G.: Advanced video-based surveillance systems, vol. 488. Springer (1999)Google Scholar
  3. 3.
    Remagnino, P.: Video-based surveillance systems: computer vision and distributed processing. Springer, Netherlands (2002)Google Scholar
  4. 4.
    Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Computer Vision and Pattern Recognition Workshop (CVPRW 2006), p. 160. IEEE (2006)Google Scholar
  5. 5.
    Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 65–89. Springer (2009)Google Scholar
  6. 6.
    Fleck, S., Straßer, W.: Smart camera based monitoring system and its application to assisted living. Proceedings of the IEEE 96, 1698–1714 (2008)CrossRefGoogle Scholar
  7. 7.
    Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Security & Privacy 3, 50–57 (2005)Google Scholar
  8. 8.
    Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–320. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  9. 9.
    Bagüés, S., Zeidler, A., Klein, C., Valdivielso, C., Matias, I.: Enabling personal privacy for pervasive computing environments. Journal of Universal Computer Science 16(3), 341–371 (2010)Google Scholar
  10. 10.
    Moßgraber, J., Reinert, F., Vagts, H.: An architecture for a task-oriented surveillance system – a service and event based approach. In: Fifth International Conference on Systems ICONS (April 2010)Google Scholar
  11. 11.
    Bauer, A., Emter, T., Vagts, H., Beyerer, J.: Object oriented world model for surveillance systems. In: Elsner, P. (ed.) Future Security: 4th Security Research Conference, pp. 339–345. Fraunhofer Verlag (October 2009)Google Scholar
  12. 12.
    Vagts, H., Krempel, E., Beyerer, J.: Privacy enforcement by identity management in smart surveillance systems. In: Proceedings of the International Conference on Distributed Multimedia Systems. Knowledge Systems Institute Graduate School, vol. 16, pp. 64–69 (October 2010)Google Scholar
  13. 13.
    Vagts, H., Krempel, E., Fischer, Y.: Access controls for privacy protection in pervasive environments. In: The 3rd Workshop on Privacy and Security in Pervasive Environments PSPAE (2011)Google Scholar
  14. 14.
    Vagts, H., Bier, C., Beyerer, J.: Anonymization in intelligent surveillance systems. In: 2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–4. IEEE (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Hauke Vagts
    • 1
    • 2
  • Erik Krempel
    • 2
  • Jürgen Beyerer
    • 1
    • 2
  1. 1.Vision and Fusion LaboratoryKarlsruhe Institute of TechnologyKarlsruheGermany
  2. 2.Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSBKarlsruheGermany

Personalised recommendations