Abstract
Surveillance Privacy Protection (SPP) is a realistic issue in the world we are living in today. Due to the massive progress in technologies and systems, surveillance is becoming quite impossible to avoid. More information is being handed out without realizing the risks involved. The objective of this chapter is to evaluate what types of surveillance, privacy and protection measures are being implemented, how information is being used and what rights individuals have over this. In addition, this chapter also emphasizes the importance of tools, data sets and databases that are being developed to enable surveillance privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Adams, A., Ferryman, J.M.: The future of video analytics for surveillance and its ethical implications. Secur. J. 3(1), 1–22 (2012)
Alderman, E., Kennedy, C.: The Right to Privacy. Vintage Book, New York (1995)
Baker, B.D., Gunter, W.D.: Surveillance: concepts and practices for fraud, security and crime investigation. Int. Found. Prot. Off. 2, 1–17 (2005)
Barrett, T.: Data privacy day is just around the corner—are you respecting privacy, safeguarding data and enabling trust? Nat. Cyber Secur. Alliance 4, 105–114 (2010)
Baym, N.K.: A call for grounding in the face of blurred boundaries. J. Comput.-Mediat. Commun. 14(3), 720–723 (2009)
Beagle, T.: Search and surveillance act threatens privacy. Tech Lib. NZ 3, 77–85 (2009)
Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Secure Comput. 2(1), 2–19 (2005)
Beveridge, R., Draper, B., Givens, G., Fisher, W.: Introduction to the statistical evaluation of face recognition algorithms. In: Face Processing, Advanced Modeling and Methods. Elsevier, Amsterdam (2005)
Boult, T.E.: PICO: privacy through invertible cryptographic obscuration. In: Proceedings of the Computer Vision for Interactive and Intelligent Environment, pp. 27–38 (2005)
Bowyer, K.W.: Face recognition technology: security versus privacy. IEEE Technol. Soc. Mag. 23(1), 9–19 (2004)
Calvel, C., Ehrette, T., Richard, G.: Event detection for audio-based surveillance system. IEEE Multimed. Expo. 1, 1306–1309 (2005)
Capdevila, G.: Communications: Technologies for Expression and for Censorship. Inter. Press Service, Geneva (2003)
Carrillo, P., Kalva, H., Magliveras, S.: Compression independent object encryption for ensuring privacy in video surveillance. In: IEEE ICME, pp. 273–276 (2008)
Carter, M., DeMolay, J., Kuszai, J.: Global positioning satellites as surveillance devices. Prog. Astronaut. Aeronaut. 5, 20–28 (2006)
Cavallaro, A.: Privacy in video surveillance. IEEE Signal Process. Mag. 24(2), 168–169 (2007)
Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP J. Adv. Signal Process. 1(1), 107 (2007)
Chinomi, K., Nitta, N., lto, Y., Babaguchi, N.: PriSurv: privacy protected video surveillance system using adaptive visual abstraction. Adv. Multimed. Model. Lect. Notes Comput. Sci. 4903(2), 144–154 (2008)
Citron, D.K., Gray, D.: Total surveillance’s privacy harms: a reply to Professor Neil Richards. Harvard Law Rev. 1, 2–10 (2012)
Clarke, R.: Internet privacy concerns confirm the case for intervention. Commun. ACM 42(2), 60–67 (1999)
Collins, R.T., Lipton, A.J., Kanade, T., Fujiyoshi, H., Duggins, D., Tsin, Y., Tolliver, D., Enomoto, N., Hasegawa, O., Burt, P., Wixson, L.: A system for video surveillance and monitoring. United States of America: Robotics Institute at Carnegie Mellon University (CMU) (2000). http://www.ri.cmu.edu/publication_view.html?pub_id=3325
Cotton, W.D., Uson, J.M.: Image pixelization and dynamic range. Nat. Radio Astron. Obs. 1(1), 3–10 (2007)
Cotton, W.D., Uson, J.M.: Pixelization and dynamic range in radio interferometry. Astron. Instrum. 490(1), 455–460 (2008)
Cullen, R.: Identify and information privacy in the age of digital government. Online Inf. Rev. 33(3), 405–421 (2009)
DeBeer, J.F., Clemmer, C.D.: Global trends in online copyright enforcement: a non-neutral role for network intermediaries? Jurimetrics 49(4), 375–409 (2009)
Dempsey, J.S.: Electronic surveillance and interception. In: Introduction to Private Security, vol. 4, p. 257 (2010)
Desurmont, X., Bastide, A., Chaudy, C., Parisot, C., Delaigle, J., Macq, B.: Image analysis architectures and techniques for intelligent surveillance systems. IEE Proc., Vis. Image Signal Process. 152(2), 224–231 (2005)
Doi, T., Itoh, T., Ogawa, H.: A long-play digital audio disk system. J. Audio Eng. Soc. 27(12), 975–981 (1979)
Dong, X.: Data hiding via phase manipulation of audio signals. In: IEEE ICASSP’04, pp. 377–380 (2004)
Dube, R.: How to protect yourself from government cellphone surveillance. N.Y. Times 2, 87–95 (2005)
Dufaux, F., Ebrahimi, T.: H.264/AVC video scrambling for privacy protection. In: IEEE ICIP, pp. 1688–1691 (2008)
Dufaux, F., Ebrahimi, T.: A framework for the validation of privacy protection solutions in video surveillance. In: IEEE ICME, pp. 66–71 (2010)
Fickes, M.: Automated eye in the sky. Gov. Secur. 1, 22 (2004)
Flaherty, D.: Protecting Privacy in Surveillance Societies, vol. 22(17), pp. 75–89. University of North Carolina Press, Chapel Hill (1989)
Flemming, J.: Privacy: the menace of satellite surveillance. USA Evid. Lawsuit Filed 3, 82–105 (2003)
Fraser, D.T.: Privacy law and video surveillance: guidance from the ontario courts. Mcinnes Cooper 3(1), 10–13 (2004)
Gilens, N.: New justice department documents show huge increase in warrantless electronic surveillance. ACLU Speech, Priv. Technol. Proj. 1, 4–7 (2012)
Gouaillier, V.: Intelligent video surveillance: promises and challenges technological and commercial intelligence report. CRIM Technopôle Def. Secur. 3(2), 9–68 (2009)
Graves, L.: The right to privacy in light of presidents’ programs: what project MINARET’s admissions reveal about modern surveillance of Americans. Tex. Law Rev. 88(7), 1855–1904 (2010)
Gray, M.: Urban surveillance and panopticism: will we recognize the facial recognition society? Surveill. Soc. 1(3), 314–330 (2003)
Grigoras, C.: Digital audio recording analysis: the electric network frequency criterion. Diam. Cut Product. Inc. 4, 1–6 (2003)
Gu, G.S., Han, G.Q.: The application of chaos and DWT in image scrambling. In: Machine Learning and Cybernetics, pp. 3729–3733 (2006)
Hampapur, A., Brown, L., Connell, J., Ekin, A., Haas, N., Lu, M., Merkl, H., Pankanti, S.: Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Signal Process. Mag. 22(2), 38–51 (2005)
Hier, S.P., Walby, K.: Privacy pragmatism and streetscape video surveillance in Canada. Int. Sociol. 26(6), 844–861 (2011)
Hill, M.: Government funds chat room surveillance research. USA Today Tech 2, 30–38 (2004)
Hooper, T., Vos, M.: Establishing business integrity in an online environment: an examination of New Zealand web site privacy notices. Online Inf. Rev., 343–361 (2009)
Hummel, R.A., Kimia, B., Zucker, S.W.: Deblurring Gaussian blur. Comput. Vis. Graph. Image Process. 38(1), 66–80 (1987)
Julie, R.S.: High-tech surveillance tools and the fourth amendment: reasonable expectations of privacy in the technological age. Am. Crim. Law Rev. 37(1), 192–222 (2000)
Junga, K., Kimb, K.I., Jainc, A.K.: Text information extraction in images and video: a survey. Pattern Recognit. 37(5), 977–997 (2004)
Karimaa, A.: Efficient video surveillance: performance evaluation in distributed video surveillance systems. In: Video Surveillance, pp. 17–26. InTech, Rijeka (2011)
Koskela, H.: ‘The gaze without eyes’: video-surveillance and the changing nature of urban space. Prog. Hum. Geogr. 24(2), 243–265 (2000)
Kumar, G.S., Ragu, S., Kumar, N.S.: Embedded video surveillance with real time monitoring on web. Int. J. Math. Trends Technol. 2(1), 46–49 (2011)
Labaton, S.: Learning to live with big brother, from civil liberties: surveillance and privacy. In: The Economist Intelligence, vol. 384(8548), pp. 62–64 (2007)
Lace, S.: The Glass Consumer: Life in a Surveillance Society. Policy Press, Bristol (2005)
Lambert, T.A.: Digital surveillance system with pre-event recording. U.S. Patent WO/2001/035668 (2001)
Langheinrich, M.: Privacy by design—principles of privacy-aware ubiquitous systems. In: Proceedings of UbiComp, pp. 273–291 (2001)
Li, G., Ito, Y., Yu, X., Nitta, N., Babaguchi, N.: Recoverable privacy protection for video content distribution. EURASIP J. Multimed. Inf. Secur. 3(4), 2–9 (2009)
Lyon, D.: Identifying citizens: ID cards as surveillance. Br. J. Sociol. 62(4), 749–750 (2011)
Maheshwari, S., Gunjan, R., Laxmi, V., Gour, M.S.: A DCT based permuted image digital watermarking method. In: IEEE TENCON, pp. 2264–2268 (2010)
Mann, S., Nolan, J., Wellman, B.: Sousveillance: inventing and using wearable computing devices for data collection in surveillance environments. IEEE Surveill. Soc. 1(3), 331–355 (2003)
Martin, K., Plataniotis, K.N.: Privacy protected surveillance using secure visual object coding. IEEE Trans. Circuits Syst. Video Technol. 18(8), 1152–1162 (2008)
McCarthy, A.: Closed circuit television. Mus. Broadcast Commun. 2, 101 (2012)
McCullagh, D.: Privacy bill requires search warrants for e-mail. Cell Track. 1, 8–13 (2012)
Milan, P., Jonker, W.: Security, privacy, and trust. In: Modern Data Management. Springer, New York (2007)
Miller, M.: Understanding digital audio formats. Que Publ. 1, 1–4 (2005)
Millett, T.: Copyright guidelines for research student. Libr. Consort. N.Z. 2, 3–14 (2012)
Mynatt, E., Back, M., Want, R., Baer, M., Ellis, J.: Designing audio aura. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 566–573 (2010)
Nabbali, T., Perry, M.: Computer law & security report. Elsevier Sci. Ltd. 20(2), 84–94, (2004)
Nagendran, A., Harper, D., Shah, M.: New system performs persistent wide-area aerial surveillance. SPIE Newsroom 5, 20–28 (2010)
Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17(2), 232–243 (2005)
Norris, C., McCahill, M., Wood, D.: The growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space. Surveill. Soc. 2(2/3), 110–135 (2004)
Orwell, G.: Go on, watch me: people are voluntarily surrendering their privacy. The Economist 75(4), 1125–1192 (2002)
Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Secur. Priv. 3(3), 50–57 (2005)
Paruchuri, J.K., Cheung, C.S., Hail, M.W.: Video data hiding for managing privacy information in surveillance systems. EURASIP J. Multimed. Inf. Secur. 8(3), 18 (2009)
Pentland, A.: Face recognition using eigenfaces. In: Proceedings of IEEE CVPR, pp. 586–591 (1991)
Phillips, P.J., Moon, H., Rauss, P.J., Rizvi, S.A.: The FERET evaluation methodology for face recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 252–274 (2000)
Pollock, D.A.: Method of electronic audio surveillance. Law J. Libr. 5(12), 380–385 (2002)
Poulsen, K.: FBI’s secret spyware tracks down teen who made bomb threats. Priv. Secur. Crime Online 1, 40–44 (2007)
Promyarut, I., Suvonvorn, N., Limsiroratana, S.: Video scrambling for privacy protection in surveillance system. In: Proceedings of International Conference on Circuits, System and Simulation, pp. 177–182 (2011)
Rao, K.R., Yip, P.C., Britanak, V.: Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic Press, San Diego (2007)
Raths, D.: Video surveillance: all eyes turn to IP. In: Campus Technology (2011)
Richmond, R.: 12 ways technology threatens your privacy (and how to protect yourself). Inf. Manag. Comput. Secur. 2, 12–13 (2009)
Roberti, M.: Two stories higlight the RFID debate. RFID J. 2, 15–22 (2005)
Rubin, R.I., Stempler, M.J.: Video surveillance in personal injury cases. Fla. Bar J. 85(6), 98 (2011)
Saini, M., Atrey, P.K., Mehrota, S., Kankanhalli, M.S.: W3-privacy: understanding what, when and where inference channels in multi-camera surveillance video. Multimed. Tools Appl., 1–24 (2012)
Schwarz, H., Marpe, D., Wiegand, T.: Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Trans. Circuits Syst. Video Technol. 17(9), 1103–1120 (2007)
Senior, A.: Protecting Privacy in Video Surveillance. Springer, London (2009)
Shamsi, H., Abdo A, A.: Privacy and surveillance post-9/11. Hum. Rights 38(1) (2011)
Sigal, L., Balan, A.O., Black, M.J.: Synchronized video and motion capture dataset and baseline algorithm for evaluation of articulated human motion. Int. J. Comput. Vis. 87(1–2), 4–27 (2010)
Simone, F.D., Naccari, M., Tagliasacchi, M., Dufaux, F., Tubaro, S., Ebrahimi, T.: Subjective quality assessment of H.264/AVC video streaming with packet losses. AEURASIP J. Image Video Process. 2, 1–12 (2011)
Slobogin, C.: Public privacy: camera surveillance of public places and the right to anonymity. Miss. Law J. 72(2), 30–60 (2002)
Slobogin, C.: Privacy at Risk: The New Government Surveillance and the Fourth Amendment. University of Chicago Press, Chicago (2007)
Smithsimon, M.: Private lives, public spaces: the surveillance state. Dissertation, University of Pennsylvania Press, USA (2003)
Socek, D., Kalva, H., Magliveras, S.S., Marques, O., Culibrk, D., Furht, B.: New approaches to encryption and steganography for digital videos. Multimed. Syst. 13(3), 191–204 (2007)
Sohn, H., AnzaKu, E., Neve, W., Ro, Y.M., Plataniotis, K.: Privacy protection in video surveillance systems using scalable video coding. In: IEEE AVSS, pp. 424–429 (2009)
Sohn, H., Lee, D., Neve, W.D., Plataniotis, K.N., Ro, Y.M.: An objective and subjective evaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR. In: Effective Surveillance for Homeland Security. Balancing Technology and Social Issues, vol. 3, pp. 111–140 (2013)
Solove, D.J.: The Digital Person: Technology and Privacy in the Information Age. NYU Press, New York (2004)
Strassfeld, R.N., Ough, C.: Somebody’s watching me: surveillance and privacy in an age of national insecurity. Case West. Reserve J. Int. Law 42(3), 110–543 (2010)
Thomas, D., Loader, B.D.: Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. Routledge, London (2000)
Tien, L., Abernathy, W.: Biometrics: who’s watching you? Electron. Front. Found. 1, 9–11 (2003)
Trent, B.: Technology and tomorrow: a challenge to liberty. Humanist 64(6), 21–24 (2004)
Tunick, M.: Privacy in public places: do GPS and video surveillance provide plain views? Soc. Theory Pract. 35(4), 597–622 (2009)
Vaile, D.: Law in the information age 2.0. Masters Thesis, The University of New South Wales, Australia (2012)
Valenzise, G., Gerosa, L., Tagliasacchi, M., Antonacci, F., Sarti, A.: Scream and gunshot detection and localisation for audio surveillance. In: IEEE AVSS, pp. 21–26 (2007)
Walczak, R.: Network video surveillance technology tools expectations. Real World Video Surveill. 5(2), 10–16 (2011)
Waterson, A.B.: Image compression using the discrete consine transform. Math. J. 4(1), 81–88 (1994)
Wee, S.J., Apostolopoulos, J.G.: Secure scalable streaming enabling transcoding without decryption. In: IEEE ICIP, pp. 437–440 (2001)
Zhao, W., Chellappa, R., Krishnaswamy, A., Wen, J.: Discriminant analysis of principal components for face recognition. In: Proceedings of IEEE International Conference on Automatic Face and Gesture Recognition, pp. 336–341 (1998)
Zhou, N., Zhou, M.L., Xu, Y.P.: BACnet for video surveillance. BACnet Today, 18–23 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Gulzar, N., Abbasi, B., Wu, E., Ozbal, A., Yan, W. (2013). Surveillance Privacy Protection. In: Atrey, P., Kankanhalli, M., Cavallaro, A. (eds) Intelligent Multimedia Surveillance. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41512-8_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-41512-8_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41511-1
Online ISBN: 978-3-642-41512-8
eBook Packages: Computer ScienceComputer Science (R0)