Abstract
Cameras are rapidly becoming a daily part of our lives. Their constant streaming of information about people gives rise to different security and privacy concerns. Human analysis using cameras or surveillance footage has been an active field of research. Different methods have been introduced which showed success in both the detection and tracking of pedestrians. Once a human is detected and/or tracked, different motion analyses can be performed in order to better understand and model human behavior. A majority of these methods do not take user privacy or security into account, making security monitoring systems a significant threat to individuals’ privacy. This threat becomes more serious and evident when the security cameras are installed in places where vulnerable people (e.g. elders, children) frequently spend time such as day-cares, schools, retirement homes, or violated to serve independent interests. This work presents a model that is able to understand human motion, and deploys an anonymization technique that facilitates the preservation of an individual’s privacy and security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cao, Z., Simon, T., Wei, S.-E., Yaser, S.: Realtime multi-person 2D pose estimation using part affinity fields. CoRR abs/1611.08050 (2016)
Dozat, T.: Incorporating Nesterov Momentum into Adam (2016)
Ji, S., Xu, W., Yang, M., Yu, K.: 3D Convolutional neural networks for human action recognition. IEEE Trans. Pattern Anal. Mach. Intell. 35(1), 221–231 (2013)
Karpathy, A., Toderici, G., Shetty, S., Leung, T., Sukthankar, R., Fei-Fei, L.: Large-scale video classification with convolutional neural networks. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, June 2014, pp. 1725–1732 (2014)
Kuehne, H., Jhuang, H., Garrote, E., Poggio, T., Serre, T.: HMDB: a large video database for human motion recognition. In: Proceedings of the International Conference on Computer Vision (ICCV) (2011)
Pramateftakis, A., Oelbaum, T., Diepold, K.: Authentication of MPEG-4-based surveillance video. In: 2004 International Conference on Image Processing, ICIP 2004, October 2004, vol. 1, pp. 33–37 (2004)
Russell, J.: In Your Face: China’s All-Seeing State, December 2017
Simonyan, K., Zisserman, A.: Two-stream convolutional networks for action recognition in videos. CoRR. 2014. abs/1406.2199
Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556 (2014)
Smeaton, A.F., Over, P., Kraaij, W.: Evaluation campaigns and TRECVid. In: MIR 2006: Proceedings of the 8th ACM International Workshop on Multimedia Information Retrieval, pp. 321–330. ACM Press, New York (2006)
Smith, J.: Data Protection, November 2016
Vlahos, J.: Surveillance Society: New High-Tech Cameras Are Watching You, November 2017
Wang, L., Ge, L., Li, R., Fang, Y.: Three-stream CNNs for action recognition. Pattern Recogn. Lett. VI. 92(C), 33–40 (2017)
Zhang, W., Cheung, S.S., Chen, M.: Hiding privacy information in video surveillance system. In: IEEE International Conference on Image Processing, September 2005, vol. 3, pp. II-868 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Shirima, E., Ghazinour, K. (2020). Towards Privacy-Aware Smart Surveillance. In: Benzekri, A., Barbeau, M., Gong, G., Laborde, R., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2019. Lecture Notes in Computer Science(), vol 12056. Springer, Cham. https://doi.org/10.1007/978-3-030-45371-8_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-45371-8_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-45370-1
Online ISBN: 978-3-030-45371-8
eBook Packages: Computer ScienceComputer Science (R0)