skip to main content
10.1145/1099554.1099711acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
Article

A novel approach for privacy-preserving video sharing

Published: 31 October 2005 Publication History

Abstract

To support privacy-preserving video sharing, we have proposed a novel framework that is able to protect the video content privacy at the individual video clip level and prevent statistical inferences from video collections. To protect the video content privacy at the individual video clip level, we have developed an effective algorithm to automatically detect privacy-sensitive video objects and video events. To prevent the statistical inferences from video collections, we have developed a distributed framework for privacy-preserving classifier training, which is able to significantly reduce the costs of data transmission and reliably limit the privacy breaches by determining the optimal size of blurred test samples for classifier validation. Our experiments on a specific domain of patient training and counseling videos show convincing results.

References

[1]
J. Fan, H. Luo, A.K. Elmagarmid, "Concept-oriented indexing of video databases: towards semantic sensitive retrieval and browsing", IEEE Trans. on Image Processing, vol.13, no.7, pp.974--992, 2004.
[2]
E. Newton, L. Sweeney, B. Malin, "Preserving privacy by de-identifying facial images", Technical Report CMU-CS-03-119, 2003, also presented at IEEE Trans. on Knowledge and Data Engineering, 2005.
[3]
J. Wickramasuriya, M. Datt, S. Mehrotra, N. Venkatasubramanian, "Privacy protecting data collection in media spaces", ACM Multimedia, 2004.
[4]
A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y. Tian, A. Ekin, "Blinkering surveillance: enabling video privacy through computer vision", IBM TR W0308-109, 2003.
[5]
R. Agrawal, R. Srikant, "Privacy-preserving data mining", ACM SIGMOD, pp.439--450, 2000.
[6]
D. Agrawal, C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms", ACM PODS, 2001.
[7]
S. Merugu, J. Ghosh, "Privacy-preserving distributed clustering using generative models", IEEE ICDM, 2003.
[8]
C.J. Adcock, "Sample size determination: A review", The Statistician, vol.46, no.2, pp.261--283, 1997.
[9]
M. Boyle, C. Edwards, S. Greenberg, "The effects of filtered video on awareness and privacy", ACM CSCW, 2000.
[10]
A. Adams, "Users' perception of privacy in multimedia communication", ACM CHI, 1999.
[11]
S. Patil, A. Kobsa, "The challenges in preserving privacy in awareness systems", TR, UC Davis, 2003.
[12]
K. Nigam, A. McCallum, S. Thrun, T. Mitchell, "Text classification from labeled and unlabeled documents using EM", Machine Learning, vol.39, no.2, 2000.
[13]
M. Szummer and T. Jaakkola, "Information Regularization with Partially Labeled Data", Proc. NIPS, 2002.
[14]
G. McLachlan and T. Krishnan, The EM algorithm and extensions, New York, John Wiley & Sons, 2000.
[15]
M. Figueiredo and A.K. Jain, "Unsupervised learning of finite mixture models", IEEE Trans. PAMI, vol.24, pp.381--396, 2002.
[16]
H. Luo, J. Fan, Y. Gao, G. Xu, "Multimodal SalientObjects: General Building Blocks of Semantic Video Concepts", CIVR, 2004.
[17]
E. Bertino, B. Ooi, Y. Yang, R. Deng, "Privacy and ownership preserving of outsourced medical data", ICDE, 521--532, 2005.
[18]
Y. Gao, J. Fan, H. Luo, G. Xu, "Salient Objects: Semantic Building Blocks for Image Concept Interpretation", CIVR, 2004.

Cited By

View all
  • (2024)Learning a Dynamic Privacy-Preserving Camera Robust to Inversion AttacksComputer Vision – ECCV 202410.1007/978-3-031-72897-6_20(349-367)Online publication date: 2-Dec-2024
  • (2023)INSPIRE: Instance-Level Privacy-Pre Serving Transformation for Vehicular Camera Videos2023 32nd International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN58024.2023.10230162(1-10)Online publication date: Jul-2023
  • (2022)A No-Reference and Full-Reference image quality assessment and enhancement framework in real-timeMultimedia Tools and Applications10.1007/s11042-022-12334-z81:22(32491-32517)Online publication date: 13-Apr-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '05: Proceedings of the 14th ACM international conference on Information and knowledge management
October 2005
854 pages
ISBN:1595931406
DOI:10.1145/1099554
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 October 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. privacy-preserving video sharing
  2. statistical inferences
  3. unlabeled samples
  4. video content privacy

Qualifiers

  • Article

Conference

CIKM05
Sponsor:
CIKM05: Conference on Information and Knowledge Management
October 31 - November 5, 2005
Bremen, Germany

Acceptance Rates

CIKM '05 Paper Acceptance Rate 77 of 425 submissions, 18%;
Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Learning a Dynamic Privacy-Preserving Camera Robust to Inversion AttacksComputer Vision – ECCV 202410.1007/978-3-031-72897-6_20(349-367)Online publication date: 2-Dec-2024
  • (2023)INSPIRE: Instance-Level Privacy-Pre Serving Transformation for Vehicular Camera Videos2023 32nd International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN58024.2023.10230162(1-10)Online publication date: Jul-2023
  • (2022)A No-Reference and Full-Reference image quality assessment and enhancement framework in real-timeMultimedia Tools and Applications10.1007/s11042-022-12334-z81:22(32491-32517)Online publication date: 13-Apr-2022
  • (2021)American Sign Language Video Anonymization to Support Online Participation of Deaf and Hard of Hearing UsersProceedings of the 23rd International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3441852.3471200(1-13)Online publication date: 17-Oct-2021
  • (2021)Smart Fog-Based Video Surveillance with Privacy Preservation based on BlockchainWireless Personal Communications10.1007/s11277-021-09426-8124:2(1677-1694)Online publication date: 29-Nov-2021
  • (2020)Exploring Collection of Sign Language Datasets: Privacy, Participation, and Model PerformanceProceedings of the 22nd International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3373625.3417024(1-14)Online publication date: 26-Oct-2020
  • (2020)Privacy-Preserving Mobile Video Sharing using Fully Homomorphic Encryption2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)10.1109/PerComWorkshops48775.2020.9156217(1-3)Online publication date: Mar-2020
  • (2020)A Weighted Feature-Based Image Quality Assessment Framework in Real-TimeTransactions on Large-Scale Data- and Knowledge-Centered Systems XLV10.1007/978-3-662-62308-4_4(85-108)Online publication date: 20-Sep-2020
  • (2019)A Real-Time Multimedia Data Quality Assessment FrameworkProceedings of the 11th International Conference on Management of Digital EcoSystems10.1145/3297662.3365803(270-276)Online publication date: 12-Nov-2019
  • (2019)Privacy concerns of multimodal sensor systemsThe Handbook of Multimodal-Multisensor Interfaces10.1145/3233795.3233813(659-704)Online publication date: 1-Jul-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media