Surveillance Privacy Protection

  • Nikki Gulzar
  • Basra Abbasi
  • Eddie Wu
  • Anil Ozbal
  • WeiQi YanEmail author


Surveillance Privacy Protection (SPP) is a realistic issue in the world we are living in today. Due to the massive progress in technologies and systems, surveillance is becoming quite impossible to avoid. More information is being handed out without realizing the risks involved. The objective of this chapter is to evaluate what types of surveillance, privacy and protection measures are being implemented, how information is being used and what rights individuals have over this. In addition, this chapter also emphasizes the importance of tools, data sets and databases that are being developed to enable surveillance privacy.


Discrete Cosine Transform Discrete Wavelet Transform Video Surveillance Privacy Protection Video Surveillance System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Adams, A., Ferryman, J.M.: The future of video analytics for surveillance and its ethical implications. Secur. J. 3(1), 1–22 (2012) Google Scholar
  2. 2.
    Alderman, E., Kennedy, C.: The Right to Privacy. Vintage Book, New York (1995) Google Scholar
  3. 3.
    Baker, B.D., Gunter, W.D.: Surveillance: concepts and practices for fraud, security and crime investigation. Int. Found. Prot. Off. 2, 1–17 (2005) Google Scholar
  4. 4.
    Barrett, T.: Data privacy day is just around the corner—are you respecting privacy, safeguarding data and enabling trust? Nat. Cyber Secur. Alliance 4, 105–114 (2010) Google Scholar
  5. 5.
    Baym, N.K.: A call for grounding in the face of blurred boundaries. J. Comput.-Mediat. Commun. 14(3), 720–723 (2009) CrossRefGoogle Scholar
  6. 6.
    Beagle, T.: Search and surveillance act threatens privacy. Tech Lib. NZ 3, 77–85 (2009) Google Scholar
  7. 7.
    Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Secure Comput. 2(1), 2–19 (2005) CrossRefGoogle Scholar
  8. 8.
    Beveridge, R., Draper, B., Givens, G., Fisher, W.: Introduction to the statistical evaluation of face recognition algorithms. In: Face Processing, Advanced Modeling and Methods. Elsevier, Amsterdam (2005) Google Scholar
  9. 9.
    Boult, T.E.: PICO: privacy through invertible cryptographic obscuration. In: Proceedings of the Computer Vision for Interactive and Intelligent Environment, pp. 27–38 (2005) CrossRefGoogle Scholar
  10. 10.
    Bowyer, K.W.: Face recognition technology: security versus privacy. IEEE Technol. Soc. Mag. 23(1), 9–19 (2004) CrossRefGoogle Scholar
  11. 11.
    Calvel, C., Ehrette, T., Richard, G.: Event detection for audio-based surveillance system. IEEE Multimed. Expo. 1, 1306–1309 (2005) Google Scholar
  12. 12.
    Capdevila, G.: Communications: Technologies for Expression and for Censorship. Inter. Press Service, Geneva (2003) Google Scholar
  13. 13.
    Carrillo, P., Kalva, H., Magliveras, S.: Compression independent object encryption for ensuring privacy in video surveillance. In: IEEE ICME, pp. 273–276 (2008) Google Scholar
  14. 14.
    Carter, M., DeMolay, J., Kuszai, J.: Global positioning satellites as surveillance devices. Prog. Astronaut. Aeronaut. 5, 20–28 (2006) Google Scholar
  15. 15.
    Cavallaro, A.: Privacy in video surveillance. IEEE Signal Process. Mag. 24(2), 168–169 (2007) MathSciNetCrossRefGoogle Scholar
  16. 16.
    Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP J. Adv. Signal Process. 1(1), 107 (2007) Google Scholar
  17. 17.
    Chinomi, K., Nitta, N., lto, Y., Babaguchi, N.: PriSurv: privacy protected video surveillance system using adaptive visual abstraction. Adv. Multimed. Model. Lect. Notes Comput. Sci. 4903(2), 144–154 (2008) CrossRefGoogle Scholar
  18. 18.
    Citron, D.K., Gray, D.: Total surveillance’s privacy harms: a reply to Professor Neil Richards. Harvard Law Rev. 1, 2–10 (2012) Google Scholar
  19. 19.
    Clarke, R.: Internet privacy concerns confirm the case for intervention. Commun. ACM 42(2), 60–67 (1999) CrossRefGoogle Scholar
  20. 20.
    Collins, R.T., Lipton, A.J., Kanade, T., Fujiyoshi, H., Duggins, D., Tsin, Y., Tolliver, D., Enomoto, N., Hasegawa, O., Burt, P., Wixson, L.: A system for video surveillance and monitoring. United States of America: Robotics Institute at Carnegie Mellon University (CMU) (2000).
  21. 21.
    Cotton, W.D., Uson, J.M.: Image pixelization and dynamic range. Nat. Radio Astron. Obs. 1(1), 3–10 (2007) Google Scholar
  22. 22.
    Cotton, W.D., Uson, J.M.: Pixelization and dynamic range in radio interferometry. Astron. Instrum. 490(1), 455–460 (2008) Google Scholar
  23. 23.
    Cullen, R.: Identify and information privacy in the age of digital government. Online Inf. Rev. 33(3), 405–421 (2009) MathSciNetCrossRefGoogle Scholar
  24. 24.
    DeBeer, J.F., Clemmer, C.D.: Global trends in online copyright enforcement: a non-neutral role for network intermediaries? Jurimetrics 49(4), 375–409 (2009) Google Scholar
  25. 25.
    Dempsey, J.S.: Electronic surveillance and interception. In: Introduction to Private Security, vol. 4, p. 257 (2010) Google Scholar
  26. 26.
    Desurmont, X., Bastide, A., Chaudy, C., Parisot, C., Delaigle, J., Macq, B.: Image analysis architectures and techniques for intelligent surveillance systems. IEE Proc., Vis. Image Signal Process. 152(2), 224–231 (2005) CrossRefGoogle Scholar
  27. 27.
    Doi, T., Itoh, T., Ogawa, H.: A long-play digital audio disk system. J. Audio Eng. Soc. 27(12), 975–981 (1979) Google Scholar
  28. 28.
    Dong, X.: Data hiding via phase manipulation of audio signals. In: IEEE ICASSP’04, pp. 377–380 (2004) Google Scholar
  29. 29.
    Dube, R.: How to protect yourself from government cellphone surveillance. N.Y. Times 2, 87–95 (2005) Google Scholar
  30. 30.
    Dufaux, F., Ebrahimi, T.: H.264/AVC video scrambling for privacy protection. In: IEEE ICIP, pp. 1688–1691 (2008) Google Scholar
  31. 31.
    Dufaux, F., Ebrahimi, T.: A framework for the validation of privacy protection solutions in video surveillance. In: IEEE ICME, pp. 66–71 (2010) Google Scholar
  32. 32.
    Fickes, M.: Automated eye in the sky. Gov. Secur. 1, 22 (2004) Google Scholar
  33. 33.
    Flaherty, D.: Protecting Privacy in Surveillance Societies, vol. 22(17), pp. 75–89. University of North Carolina Press, Chapel Hill (1989) Google Scholar
  34. 34.
    Flemming, J.: Privacy: the menace of satellite surveillance. USA Evid. Lawsuit Filed 3, 82–105 (2003) Google Scholar
  35. 35.
    Fraser, D.T.: Privacy law and video surveillance: guidance from the ontario courts. Mcinnes Cooper 3(1), 10–13 (2004) Google Scholar
  36. 36.
    Gilens, N.: New justice department documents show huge increase in warrantless electronic surveillance. ACLU Speech, Priv. Technol. Proj. 1, 4–7 (2012) Google Scholar
  37. 37.
    Gouaillier, V.: Intelligent video surveillance: promises and challenges technological and commercial intelligence report. CRIM Technopôle Def. Secur. 3(2), 9–68 (2009) Google Scholar
  38. 38.
    Graves, L.: The right to privacy in light of presidents’ programs: what project MINARET’s admissions reveal about modern surveillance of Americans. Tex. Law Rev. 88(7), 1855–1904 (2010) Google Scholar
  39. 39.
    Gray, M.: Urban surveillance and panopticism: will we recognize the facial recognition society? Surveill. Soc. 1(3), 314–330 (2003) Google Scholar
  40. 40.
    Grigoras, C.: Digital audio recording analysis: the electric network frequency criterion. Diam. Cut Product. Inc. 4, 1–6 (2003) Google Scholar
  41. 41.
    Gu, G.S., Han, G.Q.: The application of chaos and DWT in image scrambling. In: Machine Learning and Cybernetics, pp. 3729–3733 (2006) Google Scholar
  42. 42.
    Hampapur, A., Brown, L., Connell, J., Ekin, A., Haas, N., Lu, M., Merkl, H., Pankanti, S.: Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Signal Process. Mag. 22(2), 38–51 (2005) CrossRefGoogle Scholar
  43. 43.
    Hier, S.P., Walby, K.: Privacy pragmatism and streetscape video surveillance in Canada. Int. Sociol. 26(6), 844–861 (2011) CrossRefGoogle Scholar
  44. 44.
    Hill, M.: Government funds chat room surveillance research. USA Today Tech 2, 30–38 (2004) Google Scholar
  45. 45.
    Hooper, T., Vos, M.: Establishing business integrity in an online environment: an examination of New Zealand web site privacy notices. Online Inf. Rev., 343–361 (2009) Google Scholar
  46. 46.
    Hummel, R.A., Kimia, B., Zucker, S.W.: Deblurring Gaussian blur. Comput. Vis. Graph. Image Process. 38(1), 66–80 (1987) CrossRefzbMATHGoogle Scholar
  47. 47.
    Julie, R.S.: High-tech surveillance tools and the fourth amendment: reasonable expectations of privacy in the technological age. Am. Crim. Law Rev. 37(1), 192–222 (2000) Google Scholar
  48. 48.
    Junga, K., Kimb, K.I., Jainc, A.K.: Text information extraction in images and video: a survey. Pattern Recognit. 37(5), 977–997 (2004) CrossRefGoogle Scholar
  49. 49.
    Karimaa, A.: Efficient video surveillance: performance evaluation in distributed video surveillance systems. In: Video Surveillance, pp. 17–26. InTech, Rijeka (2011) Google Scholar
  50. 50.
    Koskela, H.: ‘The gaze without eyes’: video-surveillance and the changing nature of urban space. Prog. Hum. Geogr. 24(2), 243–265 (2000) MathSciNetCrossRefGoogle Scholar
  51. 51.
    Kumar, G.S., Ragu, S., Kumar, N.S.: Embedded video surveillance with real time monitoring on web. Int. J. Math. Trends Technol. 2(1), 46–49 (2011) Google Scholar
  52. 52.
    Labaton, S.: Learning to live with big brother, from civil liberties: surveillance and privacy. In: The Economist Intelligence, vol. 384(8548), pp. 62–64 (2007) Google Scholar
  53. 53.
    Lace, S.: The Glass Consumer: Life in a Surveillance Society. Policy Press, Bristol (2005) Google Scholar
  54. 54.
    Lambert, T.A.: Digital surveillance system with pre-event recording. U.S. Patent WO/2001/035668 (2001) Google Scholar
  55. 55.
    Langheinrich, M.: Privacy by design—principles of privacy-aware ubiquitous systems. In: Proceedings of UbiComp, pp. 273–291 (2001) Google Scholar
  56. 56.
    Li, G., Ito, Y., Yu, X., Nitta, N., Babaguchi, N.: Recoverable privacy protection for video content distribution. EURASIP J. Multimed. Inf. Secur. 3(4), 2–9 (2009) Google Scholar
  57. 57.
    Lyon, D.: Identifying citizens: ID cards as surveillance. Br. J. Sociol. 62(4), 749–750 (2011) CrossRefGoogle Scholar
  58. 58.
    Maheshwari, S., Gunjan, R., Laxmi, V., Gour, M.S.: A DCT based permuted image digital watermarking method. In: IEEE TENCON, pp. 2264–2268 (2010) Google Scholar
  59. 59.
    Mann, S., Nolan, J., Wellman, B.: Sousveillance: inventing and using wearable computing devices for data collection in surveillance environments. IEEE Surveill. Soc. 1(3), 331–355 (2003) Google Scholar
  60. 60.
    Martin, K., Plataniotis, K.N.: Privacy protected surveillance using secure visual object coding. IEEE Trans. Circuits Syst. Video Technol. 18(8), 1152–1162 (2008) CrossRefGoogle Scholar
  61. 61.
    McCarthy, A.: Closed circuit television. Mus. Broadcast Commun. 2, 101 (2012) Google Scholar
  62. 62.
    McCullagh, D.: Privacy bill requires search warrants for e-mail. Cell Track. 1, 8–13 (2012) Google Scholar
  63. 63.
    Milan, P., Jonker, W.: Security, privacy, and trust. In: Modern Data Management. Springer, New York (2007) Google Scholar
  64. 64.
    Miller, M.: Understanding digital audio formats. Que Publ. 1, 1–4 (2005) Google Scholar
  65. 65.
    Millett, T.: Copyright guidelines for research student. Libr. Consort. N.Z. 2, 3–14 (2012) Google Scholar
  66. 66.
    Mynatt, E., Back, M., Want, R., Baer, M., Ellis, J.: Designing audio aura. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 566–573 (2010) Google Scholar
  67. 67.
    Nabbali, T., Perry, M.: Computer law & security report. Elsevier Sci. Ltd. 20(2), 84–94, (2004) Google Scholar
  68. 68.
    Nagendran, A., Harper, D., Shah, M.: New system performs persistent wide-area aerial surveillance. SPIE Newsroom 5, 20–28 (2010) Google Scholar
  69. 69.
    Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17(2), 232–243 (2005) CrossRefGoogle Scholar
  70. 70.
    Norris, C., McCahill, M., Wood, D.: The growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space. Surveill. Soc. 2(2/3), 110–135 (2004) Google Scholar
  71. 71.
    Orwell, G.: Go on, watch me: people are voluntarily surrendering their privacy. The Economist 75(4), 1125–1192 (2002) Google Scholar
  72. 72.
    Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Secur. Priv. 3(3), 50–57 (2005) CrossRefGoogle Scholar
  73. 73.
    Paruchuri, J.K., Cheung, C.S., Hail, M.W.: Video data hiding for managing privacy information in surveillance systems. EURASIP J. Multimed. Inf. Secur. 8(3), 18 (2009) Google Scholar
  74. 74.
    Pentland, A.: Face recognition using eigenfaces. In: Proceedings of IEEE CVPR, pp. 586–591 (1991) Google Scholar
  75. 75.
    Phillips, P.J., Moon, H., Rauss, P.J., Rizvi, S.A.: The FERET evaluation methodology for face recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 252–274 (2000) Google Scholar
  76. 76.
    Pollock, D.A.: Method of electronic audio surveillance. Law J. Libr. 5(12), 380–385 (2002) Google Scholar
  77. 77.
    Poulsen, K.: FBI’s secret spyware tracks down teen who made bomb threats. Priv. Secur. Crime Online 1, 40–44 (2007) Google Scholar
  78. 78.
    Promyarut, I., Suvonvorn, N., Limsiroratana, S.: Video scrambling for privacy protection in surveillance system. In: Proceedings of International Conference on Circuits, System and Simulation, pp. 177–182 (2011) Google Scholar
  79. 79.
    Rao, K.R., Yip, P.C., Britanak, V.: Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic Press, San Diego (2007) Google Scholar
  80. 80.
    Raths, D.: Video surveillance: all eyes turn to IP. In: Campus Technology (2011) Google Scholar
  81. 81.
    Richmond, R.: 12 ways technology threatens your privacy (and how to protect yourself). Inf. Manag. Comput. Secur. 2, 12–13 (2009) Google Scholar
  82. 82.
    Roberti, M.: Two stories higlight the RFID debate. RFID J. 2, 15–22 (2005) Google Scholar
  83. 83.
    Rubin, R.I., Stempler, M.J.: Video surveillance in personal injury cases. Fla. Bar J. 85(6), 98 (2011) Google Scholar
  84. 84.
    Saini, M., Atrey, P.K., Mehrota, S., Kankanhalli, M.S.: W3-privacy: understanding what, when and where inference channels in multi-camera surveillance video. Multimed. Tools Appl., 1–24 (2012) Google Scholar
  85. 85.
    Schwarz, H., Marpe, D., Wiegand, T.: Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Trans. Circuits Syst. Video Technol. 17(9), 1103–1120 (2007) CrossRefGoogle Scholar
  86. 86.
    Senior, A.: Protecting Privacy in Video Surveillance. Springer, London (2009) CrossRefGoogle Scholar
  87. 87.
    Shamsi, H., Abdo A, A.: Privacy and surveillance post-9/11. Hum. Rights 38(1) (2011) Google Scholar
  88. 88.
    Sigal, L., Balan, A.O., Black, M.J.: Synchronized video and motion capture dataset and baseline algorithm for evaluation of articulated human motion. Int. J. Comput. Vis. 87(1–2), 4–27 (2010) CrossRefGoogle Scholar
  89. 89.
    Simone, F.D., Naccari, M., Tagliasacchi, M., Dufaux, F., Tubaro, S., Ebrahimi, T.: Subjective quality assessment of H.264/AVC video streaming with packet losses. AEURASIP J. Image Video Process. 2, 1–12 (2011) CrossRefGoogle Scholar
  90. 90.
    Slobogin, C.: Public privacy: camera surveillance of public places and the right to anonymity. Miss. Law J. 72(2), 30–60 (2002) Google Scholar
  91. 91.
    Slobogin, C.: Privacy at Risk: The New Government Surveillance and the Fourth Amendment. University of Chicago Press, Chicago (2007) CrossRefGoogle Scholar
  92. 92.
    Smithsimon, M.: Private lives, public spaces: the surveillance state. Dissertation, University of Pennsylvania Press, USA (2003) Google Scholar
  93. 93.
    Socek, D., Kalva, H., Magliveras, S.S., Marques, O., Culibrk, D., Furht, B.: New approaches to encryption and steganography for digital videos. Multimed. Syst. 13(3), 191–204 (2007) CrossRefGoogle Scholar
  94. 94.
    Sohn, H., AnzaKu, E., Neve, W., Ro, Y.M., Plataniotis, K.: Privacy protection in video surveillance systems using scalable video coding. In: IEEE AVSS, pp. 424–429 (2009) Google Scholar
  95. 95.
    Sohn, H., Lee, D., Neve, W.D., Plataniotis, K.N., Ro, Y.M.: An objective and subjective evaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR. In: Effective Surveillance for Homeland Security. Balancing Technology and Social Issues, vol. 3, pp. 111–140 (2013) Google Scholar
  96. 96.
    Solove, D.J.: The Digital Person: Technology and Privacy in the Information Age. NYU Press, New York (2004) Google Scholar
  97. 97.
    Strassfeld, R.N., Ough, C.: Somebody’s watching me: surveillance and privacy in an age of national insecurity. Case West. Reserve J. Int. Law 42(3), 110–543 (2010) Google Scholar
  98. 98.
    Thomas, D., Loader, B.D.: Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. Routledge, London (2000) Google Scholar
  99. 99.
    Tien, L., Abernathy, W.: Biometrics: who’s watching you? Electron. Front. Found. 1, 9–11 (2003) Google Scholar
  100. 100.
    Trent, B.: Technology and tomorrow: a challenge to liberty. Humanist 64(6), 21–24 (2004) Google Scholar
  101. 101.
    Tunick, M.: Privacy in public places: do GPS and video surveillance provide plain views? Soc. Theory Pract. 35(4), 597–622 (2009) CrossRefGoogle Scholar
  102. 102.
    Vaile, D.: Law in the information age 2.0. Masters Thesis, The University of New South Wales, Australia (2012) Google Scholar
  103. 103.
    Valenzise, G., Gerosa, L., Tagliasacchi, M., Antonacci, F., Sarti, A.: Scream and gunshot detection and localisation for audio surveillance. In: IEEE AVSS, pp. 21–26 (2007) Google Scholar
  104. 104.
    Walczak, R.: Network video surveillance technology tools expectations. Real World Video Surveill. 5(2), 10–16 (2011) Google Scholar
  105. 105.
    Waterson, A.B.: Image compression using the discrete consine transform. Math. J. 4(1), 81–88 (1994) MathSciNetGoogle Scholar
  106. 106.
    Wee, S.J., Apostolopoulos, J.G.: Secure scalable streaming enabling transcoding without decryption. In: IEEE ICIP, pp. 437–440 (2001) Google Scholar
  107. 107.
    Zhao, W., Chellappa, R., Krishnaswamy, A., Wen, J.: Discriminant analysis of principal components for face recognition. In: Proceedings of IEEE International Conference on Automatic Face and Gesture Recognition, pp. 336–341 (1998) CrossRefGoogle Scholar
  108. 108.
    Zhou, N., Zhou, M.L., Xu, Y.P.: BACnet for video surveillance. BACnet Today, 18–23 (2004) Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Nikki Gulzar
    • 1
  • Basra Abbasi
    • 1
  • Eddie Wu
    • 1
  • Anil Ozbal
    • 1
  • WeiQi Yan
    • 1
    Email author
  1. 1.Auckland University of TechnologyAucklandNew Zealand

Personalised recommendations