skip to main content
10.1145/1865987.1866009acmconferencesArticle/Chapter ViewAbstractPublication PagesicdscConference Proceedingsconference-collections
research-article

A systematic approach towards user-centric privacy and security for smart camera networks

Published: 31 August 2010 Publication History

Abstract

The majority of research in the field of camera networks is targeted at distributed and cooperative processing, advanced computer vision algorithms or the development of embedded, ubiquitous camera systems. Privacy and security are topics that are often overlooked or considered as an afterthought. With the digitalization of visual surveillance, data can easily be stored and accessed. This raises the question how confidential data can be protected, authenticity and integrity can be ensured and access can be restricted. This work discusses security and privacy issues relevant in the context of visual surveillance and camera networks. We try to capture the state of the art on these aspects in the available literature and highlight areas that require special consideration. We present a concept of a privacy-preserving camera system based on Trusted Computing. In our system-level approach, we consider privacy and security as primary goals without limiting the overall usefulness of a camera system.

References

[1]
}}N. Baaziz, N. Lolo, O. Padilla, and F. Petngang. Security and Privacy Protection for Automated Video Surveillance. In Proceedings of the International Symposium on Signal Processing and Information Technology, pages 17--22, 2007.
[2]
}}T. E. Boult. PICO: Privacy through Invertible Cryptographic Obscuration. In Proceedings of the Workshop on Computer Vision for Interactive and Intelligent Environments, pages 27--38, 2005.
[3]
}}J. Brassil. Using Mobile Communications to Assert Privacy from Video Surveillance. In Proceedings of the Parallel and Distributed Processing Symposium, page 8, 2005.
[4]
}}A. Cavallaro. Adding Privacy Constraints to Video-Based Applications. In Proceedings of the European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology, page 8, 2004.
[5]
}}A. Cavallaro. Privacy in Video Surveillance. IEEE Signal Processing Magazine, 24(2):166--168, March 2007.
[6]
}}A. Chattopadhyay and T. E. Boult. PrivacyCam: A Privacy Preserving Camera Using uCLinux on the Blackfin DSP. In Proceedings of the Conference on Computer Vision and Pattern Recognition, page 8, 2007.
[7]
}}D. Chen, Y. Chang, R. Yan, and J. Yang. Tools for Protecting the Privacy of Specific Individuals in Video. EURASIP Journal of Applied Signal Processing, 2007(1):107--116, January 2007.
[8]
}}S. C. S. Cheung, J. K. Paruchuri, and T. P. Nguyen. Managing Privacy Data in Pervasive Camera Networks. In Proceedings of the International Conference on Image Processing, pages 1676--1679, 2008.
[9]
}}S.-C. S. Cheung, J. Zhao, and M. V. Venkatesh. Efficient Object-Based Video Inpainting. In Proceedings of the International Conference on Image Processing, pages 705--708, 2006.
[10]
}}K. Chinomi, N. Nitta, Y. Ito, and N. Babaguchi. PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction. In Proceedings of the Int. Multimedia Modeling Conf., page 144, 2008.
[11]
}}F. Dufaux and T. Ebrahimi. Scrambling for Video Surveillance with Privacy. In Proceedings of the Conference on Computer Vision and Pattern Recognition Workshop, pages 160--166, 2006.
[12]
}}M. Hadem and J. Kuri. Google Street View: Rechtsverletzung im Sekundentakt? (in German), March 2010. last visisted: April 2010.
[13]
}}A. Hampapur. Smart Video Surveillance for Proactive Security. IEEE Signal Processing Magazine, 25(4):136--134, July 2008.
[14]
}}I. Martinez-Ponte, X. Desurmont, J. Meessen, and J. F. Delaigle. Robust Human Face Hiding Ensuring Privacy. In Proceedings of the Internat. Workshop on Image Analysis for Multimedia Interactive Services, page 4, 2005.
[15]
}}J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. Int. Journal of Security and Networks, 4(1/2):43--56, 2009.
[16]
}}S. Moncrieff, S. Venkatesh, and G. West. Dynamic Privacy in Public Surveillance. IEEE Computer, 42(9):22--28, Sept. 2009.
[17]
}}J. K. Paruchuri and S. C. S. Cheung. Joint Optimization of Data Hiding and Video Compression. In Proceedings of the International Symposium on Circuits and Systems, pages 3021--3024, 2008.
[18]
}}J. Schiff, M. Meingast, D. K. Mulligan, S. Sastry, and K. Y. Goldberg. Respectful Cameras: Selecting Visual Markers in Real-Time to Address Privacy Concerns. In Proceedings of the International Conference on Intelligent Robots and Systems, pages 971--978, 2007.
[19]
}}A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, A. Ekin, J. Connell, C. F. Shu, and M. Lu. Enabling Video Privacy through Computer Vision. IEEE Security & Privacy Magazine, 3(3):50--57, May/June 2005.
[20]
}}D. N. Serpanos and A. Papalambrou. Security and Privacy in Distributed Smart Cameras. Proceedings of the IEEE, 96(10):1678--1687, October 2008.
[21]
}}T. Spindler, C. Wartmann, L. Hovestadt, D. Roth, L. van Gool, and A. Steffen. Privacy in Video Surveilled Areas. In Proceedings of the International Conference on Privacy, Security and Trust, page 10, 2006.
[22]
}}S. Tansuriyavong and S. Hanaki. Privacy Protection by concealing Persons in circumstantial Video Image. In Proceedings of the Workshop on Perceptive User Interfaces, pages 1--4, 2001.
[23]
}}K. Truong, S. Patel, J. Summet, and G. Abowd. Preventing Camera Recording by Designing a Capture-Resistant Environment. In Proceedings of the Int. Conference on Ubiquitous Computing, pages 73--86, 2005.
[24]
}}Trusted Computing Group. TPM Main Specification Version 1.2, Level 2, Revision 103, July 2007.
[25]
}}J. Wickramasuriya, M. Datt, S. Mehrotra, and N. Venkatasubramanian. Privacy Protecting Data Collection in Media Spaces. In Proceedings of the International Conference on Multimedia, pages 48--55, 2004.
[26]
}}T. Winkler and B. Rinner. TrustCAM: Security and Privacy-Protection for an Embedded Smart Camera based on Trusted Computing. In Proceedings of the Conference on Advanced Video and Signal-Based Surveillance, 2010.
[27]
}}T. Winkler and B. Rinner. User-Based Attestation for Trustworthy Visual Sensor Networks. In Proceedings of the Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2010.
[28]
}}K. Yabuta, H. Kitazawa, and T. Tanaka. A New Concept of Security Camera Monitoring with Privacy Protection by Masking Moving Objects. In Proceedings of the Pacific-Rim Conf. on Multimedia, page 12, 2005.

Cited By

View all
  • (2023)OptiRing: Low-Resolution Optical Sensing for Subtle Thumb-to-Index Micro-InteractionsProceedings of the 2023 ACM Symposium on Spatial User Interaction10.1145/3607822.3614538(1-13)Online publication date: 13-Oct-2023
  • (2022)PUBA: Privacy-Preserving User-Data Bookkeeping and AnalyticsProceedings on Privacy Enhancing Technologies10.2478/popets-2022-00542022:2(447-516)Online publication date: 3-Mar-2022
  • (2018)Design and implementation of a secure and trustworthy platform for privacy-aware video surveillanceInternational Journal of Information Security10.1007/s10207-017-0370-417:3(279-290)Online publication date: 1-Jun-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICDSC '10: Proceedings of the Fourth ACM/IEEE International Conference on Distributed Smart Cameras
August 2010
252 pages
ISBN:9781450303170
DOI:10.1145/1865987
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 August 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. privacy
  2. security
  3. smart cameras
  4. trusted computing

Qualifiers

  • Research-article

Conference

ICDSC '10
Sponsor:
ICDSC '10: International Conference on Distributed Smart Cameras
August 31 - September 4, 2010
Georgia, Atlanta

Acceptance Rates

Overall Acceptance Rate 92 of 117 submissions, 79%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)23
  • Downloads (Last 6 weeks)6
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)OptiRing: Low-Resolution Optical Sensing for Subtle Thumb-to-Index Micro-InteractionsProceedings of the 2023 ACM Symposium on Spatial User Interaction10.1145/3607822.3614538(1-13)Online publication date: 13-Oct-2023
  • (2022)PUBA: Privacy-Preserving User-Data Bookkeeping and AnalyticsProceedings on Privacy Enhancing Technologies10.2478/popets-2022-00542022:2(447-516)Online publication date: 3-Mar-2022
  • (2018)Design and implementation of a secure and trustworthy platform for privacy-aware video surveillanceInternational Journal of Information Security10.1007/s10207-017-0370-417:3(279-290)Online publication date: 1-Jun-2018
  • (2017)Covert photo classification by deep convolutional neural networksMachine Vision and Applications10.1007/s00138-017-0859-x28:5-6(623-634)Online publication date: 1-Aug-2017
  • (2016)Understanding trust in privacy-aware video surveillance systemsInternational Journal of Information Security10.1007/s10207-015-0286-915:3(225-234)Online publication date: 1-Jun-2016
  • (2015)Covert Photo Classification by Fusing Image Features and Visual AttributesIEEE Transactions on Image Processing10.1109/TIP.2015.243143724:10(2996-3008)Online publication date: Oct-2015
  • (2014)Issues and Challenges in Securing eHealth SystemsInternational Journal of E-Health and Medical Communications10.4018/ijehmc.20140101015:1(1-19)Online publication date: 1-Jan-2014
  • (2014)Security and Privacy in Video Surveillance: Requirements and ChallengesICT Systems Security and Privacy Protection10.1007/978-3-642-55415-5_14(169-184)Online publication date: 2014
  • (2013)Crowd context-dependent privacy protection filters2013 18th International Conference on Digital Signal Processing (DSP)10.1109/ICDSP.2013.6622808(1-6)Online publication date: Jul-2013
  • (2013)A decentralized privacy-sensitive video surveillance framework2013 18th International Conference on Digital Signal Processing (DSP)10.1109/ICDSP.2013.6622765(1-6)Online publication date: Jul-2013
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media