Abstract
Though designing, deploying, and operating a video surveillance system in a public place is a relatively simple engineering task, equipping operational systems with privacy enhancing technology presents extraordinarily difficult technical challenges. We explore using mobile communications and location tracking to enable individuals to assert a preference for privacy from video surveillance. Rather than prohibit or defeat surveillance, our system – Cloak – seeks to discourage surveillers from distributing video without the authorization of the surveilled. We review the system architecture and operation, and demonstrate how privacy can be enhanced while requiring no change to existing surveillance technology. We use analysis and simulation to explore the solution’s feasibility, and show that an individual’s video privacy can be protected even in the presence of the many sources of error (e.g., dense crowds, unsynchronized clocks, unreliable communications, location error, location signal loss) we anticipate in a deployed system. Finally, we discuss the key technical, social, and legal barriers to Cloak’s large-scale deployment, and argue that the pervasive use of camera phones requires the focus of efforts on surveillance privacy technology to shift to limiting dissemination rather than limiting video capture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
New York Civil Liberties Union Report, “Who’s Watching? Video Camera Surveillance in New York City and the Need for Public Oversight,” http://www.nyclu.org/pdfs/surveillance_cams_report_121206.pdf, 2006.
Electronic Privacy Information Center, “Video Surveillance,” http://www.epic.org/surveillance.
Government of Canada News Centre, “Privacy Commissioners Release New Video Surveillance Guidelines,” http://newsgc.ca/web/view/en/index.jsp?articleid=383707.
D.J. Solove “‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy,” San Diego Law Review, Vol.44, p. 745, 2007.
“InFoTrends/CAP Ventures Forecasts 2009 Camera Phones at 847 Million Units,” http://www.digitalcamerainfo.com/content/InFoTrends-CAP-Ventures-Forecasts-2009-Camera-Phones-Sales-At-847-Million-Units.htm, 2005.
J. Brassil, “Using Mobile Communications to Assert Privacy from Video Surveillance,” Proceedings of the First Workshop on Security in Systems and Networks (IPDPS 2005), Denver CO, April 2005.
D.J. Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review, Vol. 154, No. 3, p. 477, January 2006.
Zoombak LLC, http://www.zoombak.com/.
Garmin GPS 18 USB Receiver Technical Specifications, http://www8.garmin.com/manuals/_425_TechnicalSpecification.pdf.
Privacy Camera, IBM Research, http://www.research.ibm.com/peoplevision/videoprivacy.html.
A. Senior, “Tracking People with Probabilistic Appearance Models,” Workshop on Privacy Enhancing Technologies, 2003.
I. Haritaoglu and M. Flickner, “Detection and Tracking of Shopping Groups in Stores,” Conference On Computer Vision and Pattern Recognition, 2001.
P. Bolliger, M. Köhler, and K. Römer, “Facet: Towards a Smart Camera Network of Mobile Phones,”http://www.vs.inf.ethz.ch/pub/papers//bolligph-facet2007.pdf, 2007.
S-C., Cheung, J. Zhao, and M.V. Venkatesh, “Efficient Object-based Video Inpainting,” IEEE International Conference on Image Processing (ICIP), 2006.
J. Wozencraft and I. Jacobs, Principles of Communications Engineering, Wiley, New York, 1965.
A. Papoulis, Probability, Random Variables, and Stochastic Processes, McGraw-Hill, New York, 1965.
IETF Geopriv Working Group, http://www.ietf.org/.html.charters/geopriv-charter.html/.
Samuel Warren and Louis D. Brandeis, “The Right to Privacy,” Harvard Law Review vol. 193, 1890.
The Surveillance Project, Queens University, Canada, http://qsilver.queensu.ca/sociology/Surveillance/overview.htm.
“The National Do Not Call Registry,” http://www.donotcall.gov
The Harris Poll, “National Do-Not-Call Registry: Seven in Ten are Registered and All of Them Will Renew Their Registration,” Poll#106, October 31, 2007.
E. Ferkenhoff, “Lawmakers Raise Concerns Over Shadowing of Ill. Candidate: Seek Privacy Zone to Bar Videotaping,” Boston Globe, May 31, 2004.
M. Helft, “Google Zooms in Too Close for Some,” New York Times, May 31, 2007.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Brassil, J. (2009). Technical Challenges in Location-Aware Video Surveillance Privacy. In: Senior, A. (eds) Protecting Privacy in Video Surveillance. Springer, London. https://doi.org/10.1007/978-1-84882-301-3_6
Download citation
DOI: https://doi.org/10.1007/978-1-84882-301-3_6
Publisher Name: Springer, London
Print ISBN: 978-1-84882-300-6
Online ISBN: 978-1-84882-301-3
eBook Packages: Computer ScienceComputer Science (R0)