Abstract
Video surveillance systems are usually installed to increase the safety and security of people or property in the monitored areas. Typical threat scenarios are robbery, vandalism, shoplifting or terrorism. Other application scenarios are more intimate and private such as home monitoring or assisted living. For a long time, it was accepted that the potential benefits of video surveillance go hand in hand with a loss of personal privacy. However, with the on-board processing capabilities of modern embedded systems it becomes possible to compensate this privacy loss by making security and privacy protection inherent features of video surveillance cameras. In the first part of this chapter, we motivate the need for the integration of security and privacy features, we discuss fundamental requirements and provide a comprehensive review of the state of the art. The second part presents the TrustCAM prototype system where a dedicated hardware security module is integrated into a camera system to achieve a high level of security. The chapter is concluded by a summary of open research issues and an outlook to future trends.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
TrustEYE website: http://trusteye.aau.at.
References
Albanesi, M.G., Ferretti, M., Guerrini, F.: A taxonomy for image authentication techniques and its application to the current state of the art. In: Proceedings of the International Conference on Image Analysis and Processing, pp. 535–540 (2001)
Atrey, P.K., Yan, W.-Q., Chang, E.-C., Kankanhalli, M.S.: A hierarchical signature scheme for robust video authentication using secret sharing. In: Proceedings of the International Conference on Multimedia Modelling, pp. 330–337 (2004)
Atrey, P.K., Yan, W.-Q., Kankanhalli, M.S.: A scalable signature scheme for video authentication. Multimed. Tools Appl. 34(1), 107–135 (2006)
Baaziz, N., Lolo, N., Padilla, O., Petngang, F.: Security and privacy protection for automated video surveillance. In: Proceedings of the International Symposium on Signal Processing and Information Technology, pp. 17–22 (2007)
Bartolini, F., Tefas, A., Barni, M., Pitas, I.: Image authentication techniques for surveillance applications. Proc. IEEE 89(10), 1403–1418 (2001)
Boult, T.E.: PICO: privacy through invertible cryptographic obscuration. In: Proceedings of the Workshop on Computer Vision for Interactive and Intelligent Environments, pp. 27–38 (2005)
Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: Proceedings of the Conference on Computer Supported Cooperative Work, pp. 1–10 (2000)
Bramberger, M., Brunner, J., Rinner, B., Schwabach, H.: Real-time video analysis on an embedded smart camera for traffic surveillance. In: IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 174–181 (2004)
Brassil, J.: Using mobile communications to assert privacy from video surveillance. In: Proceedings of the Parallel and Distributed Processing Symposium, p. 8 (2005)
CARE Consortium: CARE – ambient assisted living: safe private homes for elderly persons. http://care-aal.eu/. Last visited March 2013
Cavallaro, A.: Adding privacy constraints to video-based applications. In: Proceedings of the European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology, p. 8 (2004)
Cavallaro, A.: Privacy in video surveillance. IEEE Signal Process. Mag. 24(2), 168–169 (2007)
Challener, D., Yoder, K., Catherman, R., Safford, D., van Doorn, L.: A Practical Guide to Trusted Computing. IBM Press, Raleigh (2008)
Chattopadhyay, A., Boult, T.E.: PrivacyCam: a privacy preserving camera using uClinux on the Blackfin DSP. In: Proceedings of the International Conference on Computer Vision and Pattern Recognition, pp. 1–8 (2007)
Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP J. Appl. Signal Process. 2007(1), 107–116 (2007)
Cheung, S.-C.S., Zhao, J., Venkatesh, M.V.: Efficient object-based video inpainting. In: Proceedings of the International Conference on Image Processing, pp. 705–708 (2006)
Cheung, S.-C.S., Paruchuri, J.K., Nguyen, T.P.: Managing privacy data in pervasive camera networks. In: Proceedings of the International Conference on Image Processing, pp. 1676–1679 (2008)
Chinomi, K., Nitta, N., Ito, Y., Babaguchi, N.: PriSurv: privacy protected video surveillance system using adaptive visual abstraction. In: Proceedings of the International Multimedia Modeling Conference, pp. 144–154 (2008)
Davis, D.: Defective sign & encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML. In: Proceedings of the USENIX Technical Conference, pp. 65–78 (2001)
Dawson, D., Derby, P., Doyle, A., Fonio, C., Huey, L., Johanson, M., Leman-Langlois, S., Lippert, R., Lyon, D., Pratte, A.-M., Smith, E., Walby, K., Wilkinson, B.: A report on camera surveillance in Canada (part two): surveillance camera awareness network. Technical report, The Surveillance Project (2009)
Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop, pp. 160–166 (2006)
Dufaux, F., Ebrahimi, T.: A framework for the validation of privacy protection solutions in video surveillance. In: Proceedings of the International Conference on Multimedia and Expo, pp. 66–71 (2010)
Farmer, D., Mann, C.C.: Surveillance nation (part I). Technol. Rev. 4, 34–43 (2003)
Fidaleo, D.A., Nguyen, H.-A., Trivedi, M.: The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In: Proceedings of the International Workshop on Video Surveillance and Sensor Networks, pp. 46–53 (2004)
Fleck, S., Straßer, W.: Smart camera based monitoring system and its application to assisted living. Proc. IEEE 96(10), 1698–1714 (2008)
Fleck, S., Straßer, W.: Towards secure and privacy sensitive surveillance. In: Proceedings of the International Conference on Distributed Smart Cameras, p. 7 (2010)
Friedman, G.L.: The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans. Consum. Electron. 39(4), 905–910 (1993)
Gross, R., Sweeney, L., De Torre, F., Baker, S.: Model-based face de-identification. In: Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop, p. 8 (2006)
He, D., Sun, Q., Tian, Q.: A secure and robust object-based video authentication system. EURASIP J. Adv. Signal Process. 2004(14), 2185–2200 (2004)
Helten, F., Fischer, B.: What do people think about CCTV? Findings from a Berlin survey. Technical report, Berlin Institute for Social Research (2004)
Krempl, S., Wilkens, A.: Datenschützer beanstanden Videoüberwachung in ECE-Einkaufszentren. http://heise.de/-1187205 (2011). Last visited March 2013
Li, G., Ito, Y., Yu, X., Nitta, N., Babaguchi, N.: Recoverable privacy protection for video content distribution. EURASIP J. Inf. Secur. 2009, 11 (2009)
Luo, Y., Ye, S., Cheung, S.-C.S.: Anonymous subject identification in privacy-aware video surveillance. In: Proceedings of the International Conference on Multimedia and Expo, pp. 83–88 (2010)
Martin, A.: The ten page introduction to trusted computing. Technical report RR-08-11, Oxford University Computing Laboratory (December 2008)
Martínez-Ponte, I., Desurmont, X., Meessen, J., Delaigle, J.-F.: Robust human face hiding ensuring privacy. In: Proceedings of the International Workshop on Image Analysis for Multimedia Interactive Services, p. 4 (2005)
Memon, N., Wong P.W.: Protecting digital media content. Commun. ACM 41(7), 35–43 (1998)
Mohanty, S.P.: A secure digital camera architecture for integrated real-time digital rights management. J. Syst. Archit. 55(10–12), 468–480 (2009)
Moncrieff, S., Venkatesh, S., West, G.: Dynamic privacy in public surveillance. IEEE Comput. 42(9), 22–28 (2009)
Ney, S., Pichler, K.: Video surveillance in Austria. Technical report, Interdisciplinary Centre for Comparative Research in the Social Sciences, Austria (2002)
Norris, C.: A review of the increased use of CCTV and video-surveillance for crime prevention purposes in Europe. Technical report, Department of Sociological Studies, University of Sheffield, United Kingdom (2009)
Pirker, M., Tögl, R., Hein, D., Danner, P.: A PrivacyCA for anonymity and trust. In: Proceedings of the International Conference on Trust and Trustworthy Computing, pp. 101–119 (2009)
Qureshi, F.Z.: Object-video streams for preserving privacy in video surveillance. In: Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance, pp. 442–447 (2009)
Qusquater, J.-J., Macq, B., Joye, M., Degand, N., Bernard, A.: Practical solution to authentication of images with a secure camera. Storage Retr. Image Video Databases 3022(1), 290–297 (1997)
Rahman, S.M.M., Hossain, M.A., Mouftah, H., El Saddik, A., Okamoto, E.: A real-time privacy-sensitive data hiding approach based on chaos cryptography. In: Proceedings of the International Conference on Multimedia and Expo, pp. 72–77 (2010)
Saini, M., Atrey, P.K., Mehrotra, S., Emmanuel, S., Kankanhalli, M.S.: Privacy modeling for video data publication. In: Proceedings of the International Conference on Multimedia and Expo, pp. 60–65 (2010)
Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.S.: Anonymous surveillance. In: Proceedings of the International Workshop on Advances in Automated Multimedia Surveillance for Public Safety, p. 6 (2011)
Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.S.: Hiding identity leakage channels for publication of surveillance video. In: Transactions on Data Hiding and Multimedia Security (2011)
Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.S.: W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video. Springer Int. J. Multimed. Tools Appl. (August), 24 (2012)
Schaffer, M., Schartner, P.: Video surveillance: a distributed approach to protect privacy. In: Proceedings of the International Conference on Communications and Multimedia Security, pp. 140–149 (2007)
Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.Y.: Respectful cameras: selecting visual markers in real-time to address privacy concerns. In: Proceedings of the International Conference on Intelligent Robots and Systems, pp. 971–978 (2007)
Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.-L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Secur. Priv. 3(3), 50–57 (2005)
Serpanos, D.N., Papalambrou, A.: Security and privacy in distributed smart cameras. Proc. IEEE 96(10), 1678–1687 (2008)
Spindler, T., Wartmann, C., Hovestadt, L., Roth, D., van Gool, L., Steffen, A.: Privacy in video surveilled areas. In: Proceedings of the International Conference on Privacy, Security and Trust, p. 10 (2006)
Tansuriyavong, S., Hanaki, S.: Privacy protection by concealing persons in circumstantial video image. In: Proceedings of the Workshop on Perceptive User Interfaces, p. 4 (2001)
Texas Instruments. BeagleBoard website. http://www.beagleboard.org. Last visited March 2013
Troncoso-Pastoriza, J.R., Pérez-Freire, L., Pérez-González, F.: Videosurveillance and privacy: covering the two sides of the mirror with DRM. In: Proceedings of the Workshop on Digital Rights Management, pp. 83–94 (2009)
Trusted Computing Group. TCG Software Stack (TSS) Specification, Version 1.2, Level 1, Errata A. http://www.trustedcomputinggroup.org/resources/tcg_software_stack_tss_specification (March 2007). Last visited March 2013
Trusted Computing Group. TPM Main Specification 1.2, Level 2, Revision 116. http://www.trustedcomputinggroup.org/developers/trusted_platform_module (July 2007). Last visited March 2013
Vagts, H., Bauer, A.: Privacy-aware object representation for surveillance systems. In: Proceedings of the International Conference on Advanced Video and Signal Based Surveillance, pp. 601–608 (2010)
Vagts, H., Beyerer, J.: Security and privacy challenges in modern surveillance systems. In: Proceedings of the Future Security Research Conference, pp. 94–116 (2009)
Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy protecting data collection in media spaces. In: Proceedings of the International Conference on Multimedia, pp. 48–55 (2004)
Williams, A., Ganesan, D., Hanson, A.: Aging in place: fall detection and localization in a distributed smart camera network. In: Proceedings of the International Conference on Multimedia, pp. 892–901 (2007)
Winkler, T., Rinner, B.: A systematic approach towards user-centric privacy and security for smart camera networks. In: Proceedings of the International Conference on Distributed Smart Cameras, p. 8 (2010)
Winkler, T., Rinner, B.: TrustCAM: security and privacy-protection for an embedded smart camera based on trusted computing. In: Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance, pp. 593–600 (2010)
Winkler, T., Rinner, B.: Securing embedded smart cameras with trusted computing. EURASIP J. Wirel. Commun. Netw. 2011, 20 (2011)
Winkler, T., Rinner, B.: User centric privacy awareness in video surveillance. Multimed. Syst. 18(2), 99–121 (2012)
Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE/ACM Trans. Netw. 7(4), 502–513 (1999)
Yabuta, K., Kitazawa, H., Tanaka, T.: A new concept of security camera monitoring with privacy protection by masking moving objects. In: Proceedings of the International Pacific-Rim Conference on Multimedia, pp. 831–842 (2005)
Ye, S., Luo, Y., Zhao, J., Cheung, S.-C.S.: Anonymous biometric access control. EURASIP J. Inf. Secur. 2009, 18 (2009)
Acknowledgements
This work was performed as part of the project TrustEYE: Trustworthy Sensing and Cooperation in Visual Sensor Networks. Footnote 1 The work was supported by funding from the European Regional Development Fund (ERDF) and the Carinthian Economic Promotion Fund (KWF) under grant KWF-3520/23312/35521.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Winkler, T., Rinner, B. (2013). Privacy and Security in Video Surveillance. In: Atrey, P., Kankanhalli, M., Cavallaro, A. (eds) Intelligent Multimedia Surveillance. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41512-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-41512-8_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41511-1
Online ISBN: 978-3-642-41512-8
eBook Packages: Computer ScienceComputer Science (R0)