Skip to main content

Technical Challenges in Location-Aware Video Surveillance Privacy

  • Chapter
Protecting Privacy in Video Surveillance

Abstract

Though designing, deploying, and operating a video surveillance system in a public place is a relatively simple engineering task, equipping operational systems with privacy enhancing technology presents extraordinarily difficult technical challenges. We explore using mobile communications and location tracking to enable individuals to assert a preference for privacy from video surveillance. Rather than prohibit or defeat surveillance, our system – Cloak – seeks to discourage surveillers from distributing video without the authorization of the surveilled. We review the system architecture and operation, and demonstrate how privacy can be enhanced while requiring no change to existing surveillance technology. We use analysis and simulation to explore the solution’s feasibility, and show that an individual’s video privacy can be protected even in the presence of the many sources of error (e.g., dense crowds, unsynchronized clocks, unreliable communications, location error, location signal loss) we anticipate in a deployed system. Finally, we discuss the key technical, social, and legal barriers to Cloak’s large-scale deployment, and argue that the pervasive use of camera phones requires the focus of efforts on surveillance privacy technology to shift to limiting dissemination rather than limiting video capture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. New York Civil Liberties Union Report, “Who’s Watching? Video Camera Surveillance in New York City and the Need for Public Oversight,” http://www.nyclu.org/pdfs/surveillance_cams_report_121206.pdf, 2006.

  2. Electronic Privacy Information Center, “Video Surveillance,” http://www.epic.org/surveillance.

  3. Government of Canada News Centre, “Privacy Commissioners Release New Video Surveillance Guidelines,” http://newsgc.ca/web/view/en/index.jsp?articleid=383707.

  4. D.J. Solove “‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy,” San Diego Law Review, Vol.44, p. 745, 2007.

    Google Scholar 

  5. “InFoTrends/CAP Ventures Forecasts 2009 Camera Phones at 847 Million Units,” http://www.digitalcamerainfo.com/content/InFoTrends-CAP-Ventures-Forecasts-2009-Camera-Phones-Sales-At-847-Million-Units.htm, 2005.

  6. J. Brassil, “Using Mobile Communications to Assert Privacy from Video Surveillance,” Proceedings of the First Workshop on Security in Systems and Networks (IPDPS 2005), Denver CO, April 2005.

    Google Scholar 

  7. D.J. Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review, Vol. 154, No. 3, p. 477, January 2006.

    Article  Google Scholar 

  8. Zoombak LLC, http://www.zoombak.com/.

  9. Garmin GPS 18 USB Receiver Technical Specifications, http://www8.garmin.com/manuals/_425_TechnicalSpecification.pdf.

  10. Privacy Camera, IBM Research, http://www.research.ibm.com/peoplevision/videoprivacy.html.

  11. A. Senior, “Tracking People with Probabilistic Appearance Models,” Workshop on Privacy Enhancing Technologies, 2003.

    Google Scholar 

  12. I. Haritaoglu and M. Flickner, “Detection and Tracking of Shopping Groups in Stores,” Conference On Computer Vision and Pattern Recognition, 2001.

    Google Scholar 

  13. P. Bolliger, M. Köhler, and K. Römer, “Facet: Towards a Smart Camera Network of Mobile Phones,”http://www.vs.inf.ethz.ch/pub/papers//bolligph-facet2007.pdf, 2007.

  14. S-C., Cheung, J. Zhao, and M.V. Venkatesh, “Efficient Object-based Video Inpainting,” IEEE International Conference on Image Processing (ICIP), 2006.

    Google Scholar 

  15. J. Wozencraft and I. Jacobs, Principles of Communications Engineering, Wiley, New York, 1965.

    Google Scholar 

  16. A. Papoulis, Probability, Random Variables, and Stochastic Processes, McGraw-Hill, New York, 1965.

    MATH  Google Scholar 

  17. IETF Geopriv Working Group, http://www.ietf.org/.html.charters/geopriv-charter.html/.

  18. Samuel Warren and Louis D. Brandeis, “The Right to Privacy,” Harvard Law Review vol. 193, 1890.

    Google Scholar 

  19. The Surveillance Project, Queens University, Canada, http://qsilver.queensu.ca/sociology/Surveillance/overview.htm.

  20. “The National Do Not Call Registry,” http://www.donotcall.gov

  21. The Harris Poll, “National Do-Not-Call Registry: Seven in Ten are Registered and All of Them Will Renew Their Registration,” Poll#106, October 31, 2007.

    Google Scholar 

  22. E. Ferkenhoff, “Lawmakers Raise Concerns Over Shadowing of Ill. Candidate: Seek Privacy Zone to Bar Videotaping,” Boston Globe, May 31, 2004.

    Google Scholar 

  23. M. Helft, “Google Zooms in Too Close for Some,” New York Times, May 31, 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jack Brassil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Brassil, J. (2009). Technical Challenges in Location-Aware Video Surveillance Privacy. In: Senior, A. (eds) Protecting Privacy in Video Surveillance. Springer, London. https://doi.org/10.1007/978-1-84882-301-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-84882-301-3_6

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84882-300-6

  • Online ISBN: 978-1-84882-301-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics