Skip to main content

Surveillance Privacy Protection

  • Chapter

Abstract

Surveillance Privacy Protection (SPP) is a realistic issue in the world we are living in today. Due to the massive progress in technologies and systems, surveillance is becoming quite impossible to avoid. More information is being handed out without realizing the risks involved. The objective of this chapter is to evaluate what types of surveillance, privacy and protection measures are being implemented, how information is being used and what rights individuals have over this. In addition, this chapter also emphasizes the importance of tools, data sets and databases that are being developed to enable surveillance privacy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Adams, A., Ferryman, J.M.: The future of video analytics for surveillance and its ethical implications. Secur. J. 3(1), 1–22 (2012)

    Google Scholar 

  2. Alderman, E., Kennedy, C.: The Right to Privacy. Vintage Book, New York (1995)

    Google Scholar 

  3. Baker, B.D., Gunter, W.D.: Surveillance: concepts and practices for fraud, security and crime investigation. Int. Found. Prot. Off. 2, 1–17 (2005)

    Google Scholar 

  4. Barrett, T.: Data privacy day is just around the corner—are you respecting privacy, safeguarding data and enabling trust? Nat. Cyber Secur. Alliance 4, 105–114 (2010)

    Google Scholar 

  5. Baym, N.K.: A call for grounding in the face of blurred boundaries. J. Comput.-Mediat. Commun. 14(3), 720–723 (2009)

    Article  Google Scholar 

  6. Beagle, T.: Search and surveillance act threatens privacy. Tech Lib. NZ 3, 77–85 (2009)

    Google Scholar 

  7. Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Secure Comput. 2(1), 2–19 (2005)

    Article  Google Scholar 

  8. Beveridge, R., Draper, B., Givens, G., Fisher, W.: Introduction to the statistical evaluation of face recognition algorithms. In: Face Processing, Advanced Modeling and Methods. Elsevier, Amsterdam (2005)

    Google Scholar 

  9. Boult, T.E.: PICO: privacy through invertible cryptographic obscuration. In: Proceedings of the Computer Vision for Interactive and Intelligent Environment, pp. 27–38 (2005)

    Chapter  Google Scholar 

  10. Bowyer, K.W.: Face recognition technology: security versus privacy. IEEE Technol. Soc. Mag. 23(1), 9–19 (2004)

    Article  Google Scholar 

  11. Calvel, C., Ehrette, T., Richard, G.: Event detection for audio-based surveillance system. IEEE Multimed. Expo. 1, 1306–1309 (2005)

    Google Scholar 

  12. Capdevila, G.: Communications: Technologies for Expression and for Censorship. Inter. Press Service, Geneva (2003)

    Google Scholar 

  13. Carrillo, P., Kalva, H., Magliveras, S.: Compression independent object encryption for ensuring privacy in video surveillance. In: IEEE ICME, pp. 273–276 (2008)

    Google Scholar 

  14. Carter, M., DeMolay, J., Kuszai, J.: Global positioning satellites as surveillance devices. Prog. Astronaut. Aeronaut. 5, 20–28 (2006)

    Google Scholar 

  15. Cavallaro, A.: Privacy in video surveillance. IEEE Signal Process. Mag. 24(2), 168–169 (2007)

    Article  MathSciNet  Google Scholar 

  16. Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP J. Adv. Signal Process. 1(1), 107 (2007)

    Google Scholar 

  17. Chinomi, K., Nitta, N., lto, Y., Babaguchi, N.: PriSurv: privacy protected video surveillance system using adaptive visual abstraction. Adv. Multimed. Model. Lect. Notes Comput. Sci. 4903(2), 144–154 (2008)

    Article  Google Scholar 

  18. Citron, D.K., Gray, D.: Total surveillance’s privacy harms: a reply to Professor Neil Richards. Harvard Law Rev. 1, 2–10 (2012)

    Google Scholar 

  19. Clarke, R.: Internet privacy concerns confirm the case for intervention. Commun. ACM 42(2), 60–67 (1999)

    Article  Google Scholar 

  20. Collins, R.T., Lipton, A.J., Kanade, T., Fujiyoshi, H., Duggins, D., Tsin, Y., Tolliver, D., Enomoto, N., Hasegawa, O., Burt, P., Wixson, L.: A system for video surveillance and monitoring. United States of America: Robotics Institute at Carnegie Mellon University (CMU) (2000). http://www.ri.cmu.edu/publication_view.html?pub_id=3325

  21. Cotton, W.D., Uson, J.M.: Image pixelization and dynamic range. Nat. Radio Astron. Obs. 1(1), 3–10 (2007)

    Google Scholar 

  22. Cotton, W.D., Uson, J.M.: Pixelization and dynamic range in radio interferometry. Astron. Instrum. 490(1), 455–460 (2008)

    Google Scholar 

  23. Cullen, R.: Identify and information privacy in the age of digital government. Online Inf. Rev. 33(3), 405–421 (2009)

    Article  MathSciNet  Google Scholar 

  24. DeBeer, J.F., Clemmer, C.D.: Global trends in online copyright enforcement: a non-neutral role for network intermediaries? Jurimetrics 49(4), 375–409 (2009)

    Google Scholar 

  25. Dempsey, J.S.: Electronic surveillance and interception. In: Introduction to Private Security, vol. 4, p. 257 (2010)

    Google Scholar 

  26. Desurmont, X., Bastide, A., Chaudy, C., Parisot, C., Delaigle, J., Macq, B.: Image analysis architectures and techniques for intelligent surveillance systems. IEE Proc., Vis. Image Signal Process. 152(2), 224–231 (2005)

    Article  Google Scholar 

  27. Doi, T., Itoh, T., Ogawa, H.: A long-play digital audio disk system. J. Audio Eng. Soc. 27(12), 975–981 (1979)

    Google Scholar 

  28. Dong, X.: Data hiding via phase manipulation of audio signals. In: IEEE ICASSP’04, pp. 377–380 (2004)

    Google Scholar 

  29. Dube, R.: How to protect yourself from government cellphone surveillance. N.Y. Times 2, 87–95 (2005)

    Google Scholar 

  30. Dufaux, F., Ebrahimi, T.: H.264/AVC video scrambling for privacy protection. In: IEEE ICIP, pp. 1688–1691 (2008)

    Google Scholar 

  31. Dufaux, F., Ebrahimi, T.: A framework for the validation of privacy protection solutions in video surveillance. In: IEEE ICME, pp. 66–71 (2010)

    Google Scholar 

  32. Fickes, M.: Automated eye in the sky. Gov. Secur. 1, 22 (2004)

    Google Scholar 

  33. Flaherty, D.: Protecting Privacy in Surveillance Societies, vol. 22(17), pp. 75–89. University of North Carolina Press, Chapel Hill (1989)

    Google Scholar 

  34. Flemming, J.: Privacy: the menace of satellite surveillance. USA Evid. Lawsuit Filed 3, 82–105 (2003)

    Google Scholar 

  35. Fraser, D.T.: Privacy law and video surveillance: guidance from the ontario courts. Mcinnes Cooper 3(1), 10–13 (2004)

    Google Scholar 

  36. Gilens, N.: New justice department documents show huge increase in warrantless electronic surveillance. ACLU Speech, Priv. Technol. Proj. 1, 4–7 (2012)

    Google Scholar 

  37. Gouaillier, V.: Intelligent video surveillance: promises and challenges technological and commercial intelligence report. CRIM Technopôle Def. Secur. 3(2), 9–68 (2009)

    Google Scholar 

  38. Graves, L.: The right to privacy in light of presidents’ programs: what project MINARET’s admissions reveal about modern surveillance of Americans. Tex. Law Rev. 88(7), 1855–1904 (2010)

    Google Scholar 

  39. Gray, M.: Urban surveillance and panopticism: will we recognize the facial recognition society? Surveill. Soc. 1(3), 314–330 (2003)

    Google Scholar 

  40. Grigoras, C.: Digital audio recording analysis: the electric network frequency criterion. Diam. Cut Product. Inc. 4, 1–6 (2003)

    Google Scholar 

  41. Gu, G.S., Han, G.Q.: The application of chaos and DWT in image scrambling. In: Machine Learning and Cybernetics, pp. 3729–3733 (2006)

    Google Scholar 

  42. Hampapur, A., Brown, L., Connell, J., Ekin, A., Haas, N., Lu, M., Merkl, H., Pankanti, S.: Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Signal Process. Mag. 22(2), 38–51 (2005)

    Article  Google Scholar 

  43. Hier, S.P., Walby, K.: Privacy pragmatism and streetscape video surveillance in Canada. Int. Sociol. 26(6), 844–861 (2011)

    Article  Google Scholar 

  44. Hill, M.: Government funds chat room surveillance research. USA Today Tech 2, 30–38 (2004)

    Google Scholar 

  45. Hooper, T., Vos, M.: Establishing business integrity in an online environment: an examination of New Zealand web site privacy notices. Online Inf. Rev., 343–361 (2009)

    Google Scholar 

  46. Hummel, R.A., Kimia, B., Zucker, S.W.: Deblurring Gaussian blur. Comput. Vis. Graph. Image Process. 38(1), 66–80 (1987)

    Article  MATH  Google Scholar 

  47. Julie, R.S.: High-tech surveillance tools and the fourth amendment: reasonable expectations of privacy in the technological age. Am. Crim. Law Rev. 37(1), 192–222 (2000)

    Google Scholar 

  48. Junga, K., Kimb, K.I., Jainc, A.K.: Text information extraction in images and video: a survey. Pattern Recognit. 37(5), 977–997 (2004)

    Article  Google Scholar 

  49. Karimaa, A.: Efficient video surveillance: performance evaluation in distributed video surveillance systems. In: Video Surveillance, pp. 17–26. InTech, Rijeka (2011)

    Google Scholar 

  50. Koskela, H.: ‘The gaze without eyes’: video-surveillance and the changing nature of urban space. Prog. Hum. Geogr. 24(2), 243–265 (2000)

    Article  MathSciNet  Google Scholar 

  51. Kumar, G.S., Ragu, S., Kumar, N.S.: Embedded video surveillance with real time monitoring on web. Int. J. Math. Trends Technol. 2(1), 46–49 (2011)

    Google Scholar 

  52. Labaton, S.: Learning to live with big brother, from civil liberties: surveillance and privacy. In: The Economist Intelligence, vol. 384(8548), pp. 62–64 (2007)

    Google Scholar 

  53. Lace, S.: The Glass Consumer: Life in a Surveillance Society. Policy Press, Bristol (2005)

    Google Scholar 

  54. Lambert, T.A.: Digital surveillance system with pre-event recording. U.S. Patent WO/2001/035668 (2001)

    Google Scholar 

  55. Langheinrich, M.: Privacy by design—principles of privacy-aware ubiquitous systems. In: Proceedings of UbiComp, pp. 273–291 (2001)

    Google Scholar 

  56. Li, G., Ito, Y., Yu, X., Nitta, N., Babaguchi, N.: Recoverable privacy protection for video content distribution. EURASIP J. Multimed. Inf. Secur. 3(4), 2–9 (2009)

    Google Scholar 

  57. Lyon, D.: Identifying citizens: ID cards as surveillance. Br. J. Sociol. 62(4), 749–750 (2011)

    Article  Google Scholar 

  58. Maheshwari, S., Gunjan, R., Laxmi, V., Gour, M.S.: A DCT based permuted image digital watermarking method. In: IEEE TENCON, pp. 2264–2268 (2010)

    Google Scholar 

  59. Mann, S., Nolan, J., Wellman, B.: Sousveillance: inventing and using wearable computing devices for data collection in surveillance environments. IEEE Surveill. Soc. 1(3), 331–355 (2003)

    Google Scholar 

  60. Martin, K., Plataniotis, K.N.: Privacy protected surveillance using secure visual object coding. IEEE Trans. Circuits Syst. Video Technol. 18(8), 1152–1162 (2008)

    Article  Google Scholar 

  61. McCarthy, A.: Closed circuit television. Mus. Broadcast Commun. 2, 101 (2012)

    Google Scholar 

  62. McCullagh, D.: Privacy bill requires search warrants for e-mail. Cell Track. 1, 8–13 (2012)

    Google Scholar 

  63. Milan, P., Jonker, W.: Security, privacy, and trust. In: Modern Data Management. Springer, New York (2007)

    Google Scholar 

  64. Miller, M.: Understanding digital audio formats. Que Publ. 1, 1–4 (2005)

    Google Scholar 

  65. Millett, T.: Copyright guidelines for research student. Libr. Consort. N.Z. 2, 3–14 (2012)

    Google Scholar 

  66. Mynatt, E., Back, M., Want, R., Baer, M., Ellis, J.: Designing audio aura. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 566–573 (2010)

    Google Scholar 

  67. Nabbali, T., Perry, M.: Computer law & security report. Elsevier Sci. Ltd. 20(2), 84–94, (2004)

    Google Scholar 

  68. Nagendran, A., Harper, D., Shah, M.: New system performs persistent wide-area aerial surveillance. SPIE Newsroom 5, 20–28 (2010)

    Google Scholar 

  69. Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17(2), 232–243 (2005)

    Article  Google Scholar 

  70. Norris, C., McCahill, M., Wood, D.: The growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space. Surveill. Soc. 2(2/3), 110–135 (2004)

    Google Scholar 

  71. Orwell, G.: Go on, watch me: people are voluntarily surrendering their privacy. The Economist 75(4), 1125–1192 (2002)

    Google Scholar 

  72. Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Secur. Priv. 3(3), 50–57 (2005)

    Article  Google Scholar 

  73. Paruchuri, J.K., Cheung, C.S., Hail, M.W.: Video data hiding for managing privacy information in surveillance systems. EURASIP J. Multimed. Inf. Secur. 8(3), 18 (2009)

    Google Scholar 

  74. Pentland, A.: Face recognition using eigenfaces. In: Proceedings of IEEE CVPR, pp. 586–591 (1991)

    Google Scholar 

  75. Phillips, P.J., Moon, H., Rauss, P.J., Rizvi, S.A.: The FERET evaluation methodology for face recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 252–274 (2000)

    Google Scholar 

  76. Pollock, D.A.: Method of electronic audio surveillance. Law J. Libr. 5(12), 380–385 (2002)

    Google Scholar 

  77. Poulsen, K.: FBI’s secret spyware tracks down teen who made bomb threats. Priv. Secur. Crime Online 1, 40–44 (2007)

    Google Scholar 

  78. Promyarut, I., Suvonvorn, N., Limsiroratana, S.: Video scrambling for privacy protection in surveillance system. In: Proceedings of International Conference on Circuits, System and Simulation, pp. 177–182 (2011)

    Google Scholar 

  79. Rao, K.R., Yip, P.C., Britanak, V.: Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic Press, San Diego (2007)

    Google Scholar 

  80. Raths, D.: Video surveillance: all eyes turn to IP. In: Campus Technology (2011)

    Google Scholar 

  81. Richmond, R.: 12 ways technology threatens your privacy (and how to protect yourself). Inf. Manag. Comput. Secur. 2, 12–13 (2009)

    Google Scholar 

  82. Roberti, M.: Two stories higlight the RFID debate. RFID J. 2, 15–22 (2005)

    Google Scholar 

  83. Rubin, R.I., Stempler, M.J.: Video surveillance in personal injury cases. Fla. Bar J. 85(6), 98 (2011)

    Google Scholar 

  84. Saini, M., Atrey, P.K., Mehrota, S., Kankanhalli, M.S.: W3-privacy: understanding what, when and where inference channels in multi-camera surveillance video. Multimed. Tools Appl., 1–24 (2012)

    Google Scholar 

  85. Schwarz, H., Marpe, D., Wiegand, T.: Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Trans. Circuits Syst. Video Technol. 17(9), 1103–1120 (2007)

    Article  Google Scholar 

  86. Senior, A.: Protecting Privacy in Video Surveillance. Springer, London (2009)

    Book  Google Scholar 

  87. Shamsi, H., Abdo A, A.: Privacy and surveillance post-9/11. Hum. Rights 38(1) (2011)

    Google Scholar 

  88. Sigal, L., Balan, A.O., Black, M.J.: Synchronized video and motion capture dataset and baseline algorithm for evaluation of articulated human motion. Int. J. Comput. Vis. 87(1–2), 4–27 (2010)

    Article  Google Scholar 

  89. Simone, F.D., Naccari, M., Tagliasacchi, M., Dufaux, F., Tubaro, S., Ebrahimi, T.: Subjective quality assessment of H.264/AVC video streaming with packet losses. AEURASIP J. Image Video Process. 2, 1–12 (2011)

    Article  Google Scholar 

  90. Slobogin, C.: Public privacy: camera surveillance of public places and the right to anonymity. Miss. Law J. 72(2), 30–60 (2002)

    Google Scholar 

  91. Slobogin, C.: Privacy at Risk: The New Government Surveillance and the Fourth Amendment. University of Chicago Press, Chicago (2007)

    Book  Google Scholar 

  92. Smithsimon, M.: Private lives, public spaces: the surveillance state. Dissertation, University of Pennsylvania Press, USA (2003)

    Google Scholar 

  93. Socek, D., Kalva, H., Magliveras, S.S., Marques, O., Culibrk, D., Furht, B.: New approaches to encryption and steganography for digital videos. Multimed. Syst. 13(3), 191–204 (2007)

    Article  Google Scholar 

  94. Sohn, H., AnzaKu, E., Neve, W., Ro, Y.M., Plataniotis, K.: Privacy protection in video surveillance systems using scalable video coding. In: IEEE AVSS, pp. 424–429 (2009)

    Google Scholar 

  95. Sohn, H., Lee, D., Neve, W.D., Plataniotis, K.N., Ro, Y.M.: An objective and subjective evaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR. In: Effective Surveillance for Homeland Security. Balancing Technology and Social Issues, vol. 3, pp. 111–140 (2013)

    Google Scholar 

  96. Solove, D.J.: The Digital Person: Technology and Privacy in the Information Age. NYU Press, New York (2004)

    Google Scholar 

  97. Strassfeld, R.N., Ough, C.: Somebody’s watching me: surveillance and privacy in an age of national insecurity. Case West. Reserve J. Int. Law 42(3), 110–543 (2010)

    Google Scholar 

  98. Thomas, D., Loader, B.D.: Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. Routledge, London (2000)

    Google Scholar 

  99. Tien, L., Abernathy, W.: Biometrics: who’s watching you? Electron. Front. Found. 1, 9–11 (2003)

    Google Scholar 

  100. Trent, B.: Technology and tomorrow: a challenge to liberty. Humanist 64(6), 21–24 (2004)

    Google Scholar 

  101. Tunick, M.: Privacy in public places: do GPS and video surveillance provide plain views? Soc. Theory Pract. 35(4), 597–622 (2009)

    Article  Google Scholar 

  102. Vaile, D.: Law in the information age 2.0. Masters Thesis, The University of New South Wales, Australia (2012)

    Google Scholar 

  103. Valenzise, G., Gerosa, L., Tagliasacchi, M., Antonacci, F., Sarti, A.: Scream and gunshot detection and localisation for audio surveillance. In: IEEE AVSS, pp. 21–26 (2007)

    Google Scholar 

  104. Walczak, R.: Network video surveillance technology tools expectations. Real World Video Surveill. 5(2), 10–16 (2011)

    Google Scholar 

  105. Waterson, A.B.: Image compression using the discrete consine transform. Math. J. 4(1), 81–88 (1994)

    MathSciNet  Google Scholar 

  106. Wee, S.J., Apostolopoulos, J.G.: Secure scalable streaming enabling transcoding without decryption. In: IEEE ICIP, pp. 437–440 (2001)

    Google Scholar 

  107. Zhao, W., Chellappa, R., Krishnaswamy, A., Wen, J.: Discriminant analysis of principal components for face recognition. In: Proceedings of IEEE International Conference on Automatic Face and Gesture Recognition, pp. 336–341 (1998)

    Chapter  Google Scholar 

  108. Zhou, N., Zhou, M.L., Xu, Y.P.: BACnet for video surveillance. BACnet Today, 18–23 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to WeiQi Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Gulzar, N., Abbasi, B., Wu, E., Ozbal, A., Yan, W. (2013). Surveillance Privacy Protection. In: Atrey, P., Kankanhalli, M., Cavallaro, A. (eds) Intelligent Multimedia Surveillance. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41512-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41512-8_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41511-1

  • Online ISBN: 978-3-642-41512-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics