skip to main content
10.1145/2659021.2659044acmconferencesArticle/Chapter ViewAbstractPublication PagesicdscConference Proceedingsconference-collections
tutorial

Privacy-protecting Smart Cameras

Published: 04 November 2014 Publication History

Abstract

Smart cameras are considered as emerging technology for the realization of various smart environments ranging from room to city scales. Since these cameras capture images that potentially reveal sensitive information about individuals, appropriate protection mechanisms are required. In this paper we discuss the key security and privacy protection domains in smart camera networks and present our TrustEYE.M4 platform which embeds privacy protection close to the image sensor and provides strong separation between hardware-supported protection and flexible scene analytics.

References

[1]
H. Aghajan and A. Cavallaro, editors. Multi-Camera Networks: Principles and Applications. Elsevier, 2009.
[2]
P. K. Atrey, W.-Q. Yan, and M. S. Kankanhalli. A Scalable Signature Scheme for Video Authentication. Multimedia Tools and Applications, 34(1):107--135, 2006.
[3]
A. Boukerche and D. Turgut. Secure Time Synchronization Protocols for Wireless Sensor Networks. IEEE Wireless Communications, 14(5):64--69, 2007.
[4]
J. Brassil. Using Mobile Communications to Assert Privacy from Video Surveillance. In Proceedings of the Parallel and Distributed Processing Symposium, page 8, 2005.
[5]
C. Castelluccia, A. C.-F. Chan, E. Mykletun, and G. Tsudik. Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3):1--36, May 2009.
[6]
A. Cavallaro. Adding Privacy Constraints to Video-Based Applications. In Proceedings of the European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology, page 8, 2004.
[7]
A. Cavallaro. Privacy in Video Surveillance. IEEE Signal Processing Magazine, 24(2):168--169, 2007.
[8]
H. Chan, A. Perrig, and D. Song. Secure Hierarchical In-Network Aggregation in Sensor Networks. In Proceedings of the International Conference on Computer and Communications Security, pages 1--10, 2006.
[9]
A. Chattopadhyay and T. E. Boult. PrivacyCam: A Privacy Preserving Camera Using uClinux on the Blackfin DSP. In Proceedings of the International Conference on Computer Vision and Pattern Recognition, pages 1--8, 2007.
[10]
S.-C. S. Cheung, J. K. Paruchuri, and T. P. Nguyen. Managing Privacy Data in Pervasive Camera Networks. In Proceedings of the International Conference on Image Processing, pages 1676--1679, 2008.
[11]
T. Dierks and C. Allen. RFC 2246: The TLS Protocol. http://www.ietf.org/rfc/rfc2246.txt, 1999.
[12]
A. Erdélyi, T. Barát, P. Valet, T. Winkler, and B. Rinner. Adaptive Cartooning for Privacy Protection in Camera Networks. In Proceedings of the International Conference on Advanced Video and Signal Based Surveillance, page 6, 2014.
[13]
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks, 11(1-2):21--38, Jan. 2005.
[14]
C. Karlof and D. Wagner. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Ad Hoc Networks, 1(2-3):293--315, 2003.
[15]
M. Manzo, T. Roosta, and S. Sastry. Time Synchronization Attacks in Sensor Networks. In Proceedings of the Workshop on Security of Ad Hoc and Sensor Networks, page 10, 2005.
[16]
I. Martínez-Ponte, X. Desurmont, J. Meessen, and J.-F. Delaigle. Robust Human Face Hiding Ensuring Privacy. In Proceedings of the International Workshop on Image Analysis for Multimedia Interactive Services, page 4, 2005.
[17]
P. Meerwald and A. Uhl. Watermarking of Raw Digital Images in Camera Firmware. IPSJ Transactions on Computer Vision and Applications, 2:16--24, 2009.
[18]
S. P. Mohanty. A Secure Digital Camera Architecture for Integrated Real-Time Digital Rights Management. Journal of Systems Architecture, 55(10-12):468--480, Oct. 2009.
[19]
S. Ozdemir and Y. Xiao. Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks, 53(12):2022--2037, Aug. 2009.
[20]
A. Perrig, R. Canetti, J. D. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol The TESLA Broadcast Authentication Protocol. RSA Cryptobytes, (5), 2002.
[21]
F. Z. Qureshi. Object-Video Streams for Preserving Privacy in Video Surveillance. In Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance, pages 442--447, 2009.
[22]
S. M. M. Rahman, M. A. Hossain, H. Mouftah, A. E. Saddik, and E. Okamoto. A Real-Time Privacy-Sensitive Data Hiding Approach based on Chaos Cryptography. In Proceedings of the International Conference on Multimedia and Expo, pages 72--77, 2010.
[23]
M. Reisslein, B. Rinner, and A. Roy-Chowdhury. Smart Camera Networks. Computer, 47(5):26--28, May 2014.
[24]
B. Rinner and W. Wolf. Introduction to Distributed Smart Cameras. Proceedings of the IEEE, 96(10):1565--1575, October 2008.
[25]
M. Saini, P. K. Atrey, S. Mehrotra, and M. S. Kankanhalli. Adaptive Transformation for Robust Privacy Protection in Video Surveillance. Advances in Multimedia, page 14, 2012.
[26]
K. Sanzgiri, D. Laflamme, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. Authenticated Routing for Ad Hoc Networks. IEEE Journal on Selected Areas in Communications, 23(3):598--610, 2005.
[27]
M. Schaffer and P. Schartner. Video Surveillance: A Distributed Approach to protect Privacy. In Proceedings of the International Conference on Communications and Multimedia Security, pages 140--149, 2007.
[28]
D. N. Serpanos and A. Papalambrou. Security and Privacy in Distributed Smart Cameras. Proceedings of the IEEE, 96(10):1678--1687, Oct. 2008.
[29]
D. Wagner. Resilient Aggregation in Sensor Networks. In Proceedings of the Workshop on Security of Ad Hoc and Sensor Networks, page 10, 2004.
[30]
D. Westhoff, J. Girao, and M. Acharya. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation. IEEE Transactions on Mobile Computing, 5(10):1417--1431, 2006.
[31]
J. Wickramasuriya, M. Datt, S. Mehrotra, and N. Venkatasubramanian. Privacy Protecting Data Collection in Media Spaces. In Proceedings of the International Conference on Multimedia, pages 48--55, 2004.
[32]
T. Winkler. TrustEYE Project Website. http://trusteye.aau.at, 2012. last visited: June 2014.
[33]
T. Winkler, A. Erdélyi, and B. Rinner. TrustEYE.M4: Protecting the Sensor -- not the Camera. In Proceedings of the International Conference on Advanced Video and Signal Based Surveillance, page 6, 2014.
[34]
T. Winkler and B. Rinner. Securing Embedded Smart Cameras with Trusted Computing. EURASIP Journal on Wireless Communications and Networking, 2011:20, 2011.
[35]
T. Winkler and B. Rinner. Security and Privacy Protection in Visual Sensor Networks: A Survey. ACM Computing Surveys, 47(1):42, 2014. (in print).

Cited By

View all
  • (2024)“I Don’t Want to Become a Number’’: Examining Different Stakeholder Perspectives on a Video-Based Monitoring System for Senior Care with Inherent Privacy Protection (by Design).Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642164(1-19)Online publication date: 11-May-2024
  • (2019)PASNICAdjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers10.1145/3341162.3343803(202-205)Online publication date: 9-Sep-2019
  • (2017)Privacy Dashcam – Towards Lawful Use of Dashcams Through Enforcement of External AnonymizationData Privacy Management, Cryptocurrencies and Blockchain Technology10.1007/978-3-319-67816-0_11(183-201)Online publication date: 13-Sep-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICDSC '14: Proceedings of the International Conference on Distributed Smart Cameras
November 2014
286 pages
ISBN:9781450329255
DOI:10.1145/2659021
  • General Chair:
  • Andrea Prati,
  • Publications Chair:
  • Niki Martinel
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 November 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Embedded smart cameras
  2. Privacy
  3. Security
  4. Visual sensors

Qualifiers

  • Tutorial
  • Research
  • Refereed limited

Conference

ICDSC '14
Sponsor:

Acceptance Rates

ICDSC '14 Paper Acceptance Rate 49 of 69 submissions, 71%;
Overall Acceptance Rate 92 of 117 submissions, 79%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)“I Don’t Want to Become a Number’’: Examining Different Stakeholder Perspectives on a Video-Based Monitoring System for Senior Care with Inherent Privacy Protection (by Design).Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642164(1-19)Online publication date: 11-May-2024
  • (2019)PASNICAdjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers10.1145/3341162.3343803(202-205)Online publication date: 9-Sep-2019
  • (2017)Privacy Dashcam – Towards Lawful Use of Dashcams Through Enforcement of External AnonymizationData Privacy Management, Cryptocurrencies and Blockchain Technology10.1007/978-3-319-67816-0_11(183-201)Online publication date: 13-Sep-2017
  • (2016)3D Cameras Benchmark for Human Tracking in Hybrid Distributed Smart Camera NetworksProceedings of the 10th International Conference on Distributed Smart Camera10.1145/2967413.2967431(76-83)Online publication date: 12-Sep-2016
  • (2016)User-centric, embedded vision-based human monitoringProceedings of the 10th International Conference on Distributed Smart Camera10.1145/2967413.2967422(25-30)Online publication date: 12-Sep-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media