skip to main content
10.1145/2967413.2967422acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdscConference Proceedingsconference-collections
research-article

User-centric, embedded vision-based human monitoring: A concept and a healthcare use case

Published: 12 September 2016 Publication History

Abstract

In an Internet of Things (IoT) camera-based monitoring application the transmission of images away from the video sensors for processing poses security and privacy risks. Hence, there is a need for an advanced trusted user-centric monitoring system that pushes the application of security and privacy protection closer to the sensor itself and which enables an enhanced control on data privacy. To this end, this white paper proposes a new approach that involves sensor edge computing to enable sensor-level security and privacy protection and allows observed individuals to interact and control their data without impacting on the quality of the data for further processing. Overall, an IoT vision system is presented that employs a network of fixed embedded cameras in a highly trusted manner, possessing both privacy-protecting and data security features. As a potential application, we discuss an Ambient Assisted Living (AAL) healthcare use case demanding privacy and security for outpatients.

References

[1]
Fastpass project. https://www.fastpass-project.eu/. Accessed March 2016.
[2]
Modem project. http://gow.epsrc.ac.uk/ngboviewgrant.aspx?grantref=ep/m006255/1. Accessed March 2016.
[3]
P5 project. http://www.foi.se/en/customer--partners/projects/p5/p51/. Accessed March 2016.
[4]
G. Acampora, D. J. Cook, P. Rashidi, and A. V. Vasilkos. A survey on ambient intelligence in healthcare. Proceedings of the IEEE, 101(12), 2013.
[5]
A. Badii, A. Al-Obaidi, M. Einig, and A. Ducournau. Holistic privacy impact assessment framework for video privacy filtering technologies. Sig. & Ima. Proc., 4(6):13--32, 2013.
[6]
N. B. Bo, F. Deboeverie, M. Eldib, J. Guan, X. Xie, J. Nino, D. V. Haerenborgh, M. Slembrouck, S. V. de Velde, H. Steendam, P. Veelaert, R. Kleihorst, H. Aghajan, and W. Philips. Human Mobility Monitoring in Very Low Resolution Visual Sensor Network. Sensors, 14:20800--20824, 2015.
[7]
A. Cavoukian. Surveillance, then and now: Securing privacy in public spaces. Technical report, 2013.
[8]
A. A. Chaaraoui, P. Climent-Perez, and F. Florez-Revuelta. A review on vision techniques applied to human behaviour analysis for ambient assisted living. Exp. Sys. Appl., 39(12):10873--10888, 2012.
[9]
A. A. Chaaraoui, J. R. Padilla-Lopez, F. J. Ferrandez-Pastor, M. Nieto-Hidalgo, and F. Florez-Revuelta. A vision-based system for intelligent monitoring: Human behaviour analysis and privacy by context. Sensors, 14:8895--8925, 2015.
[10]
Y. Charlon, N. Fourty, W. Bourennane, and E. Campo. Design and evaluation of a device worn for fall detection and localization: Application for the continuous monitoring of risks incurred by dependents in an alzheimer's care unit. Exp. Sys. Appl., 40(18):7316--7330, 2013.
[11]
D. Cook and M. Schmitter-Edgecombe. Assessing the quality of activities in a smart environment. MIM, 48(5):480--485, 2009.
[12]
J. Delvaux, R. Peeters, D. Gu, and I. Verbauwhede. A survey on lightweight entity authentication with strong pufs. ACM Comp. Surv., 48(2), 2015.
[13]
F. Dufaux and T. Ebrahimi. A framework for the validation of privacy protection solutions in video surveillance. In Proc. of ICME, 2010.
[14]
A. Erdelyi, T. Barat, P. Valet, T. Winkler, and B. Rinner. Adaptive cartooning for privacy protection in camera networks. In Proc. of AVSS, Seoul, August 2014.
[15]
D. Giansanti, V. Macellari, and G. Maccioni. Telemonitoring and telerehabilitation of patients with parkinson's disease: health technology assessment of a novel wearable step counter. Telemed. e-health, 14(1):76--83, 2008.
[16]
P. Gupta and T. Dallas. Feature selection and activity recognition system using a single triaxial accelerometer. IEEE TBME, 61(6):1780--1786, 2014.
[17]
M. Hoeberl, I. Haider, and B. Rinner. Towards a secure key generation and storage framework on resource-constrained sensor nodes. In Proc. of EWSN Work., Graz, 2016.
[18]
A. Kealy, K. McDaid, J. Loane, L. Walsh, and J. Doyle. Derivation of night time behaviour metrics using ambient sensors. In Proc. of PervasiveHealth, Venice, 2013.
[19]
P. Korshunov, C. Araimo, F. D. Simone, C. Velardo, J.-L. Dugelay, and T. Ebrahimi. Subjective study of privacy filters in video surveillance. In Proc. of IEEE Work. MMSP, 2012.
[20]
R. Megret, V. Dovgalecs, H. Wannous, S. Karaman, J. Benois-Pineau, E. E. Khoury, J. Pinquier, P. Joly, R. Andre-Obrecht, Y. Gaestel, and J.-F. Dartigues. The immed project: wearable video monitoring of people with age dementia. In Proc. of ACM MM, Firenze, 2010.
[21]
M. Mubashir, L. Shao, and L. Seed. A survey on fall detection: Principles and approaches. Neurocomp., 100(2013):144--152, 2013.
[22]
M. Nambu, K. Nakajima, M. Noshiro, and T. Tamura. An algorithm for the automatic detection of health conditions. IEEE EMBM, 24(4):38--42, 2005.
[23]
T. Nawaz and A. Cavallaro. A protocol for evaluating video trackers under real-world conditions. IEEE TIP, 22(4):1354--1361, 2013.
[24]
T. Nawaz and J. Ferryman. An annotation-free method for evaluating privacy protection techniques in videos. In Proc. of AVSS, Karlsruhe, 2015.
[25]
J. R. Padilla-Lopez, A. A. Chaaraoui, and F. Florez-Revuelta. Visual privacy protection methods: A survey. Exp. Sys. Appl., 42(9):4177--4195, 2015.
[26]
F. Pittaluga and S. J. Koppal. Privacy preserving optics for miniature vision sensors. In Proc. of CVPR, Boston, MA, June 2015.
[27]
B. Rinner and T. Winkler. Privacy-protecting smart cameras. In Proc. of ICDSC, Venice, Italy, 2014.
[28]
A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, A. Ekin, J. Connell, C. F. Shu, and M. Lu. Enabling video privacy through computer vision. IEEE Sec. Priv., 3(3):50--57, 2005.
[29]
D. N. Serpanos and A. Papalambrou. Security and privacy in distributed smart cameras. Proceedings of the IEEE, 96(10):1678--1687, 2008.
[30]
R. Wang, G. Medioni, C. J. Winstein, and C. Blanco. Home monitoring musculo-skeletal disorders with a single 3d sensor. In Proc. of CVPR Work., 2013.
[31]
T. Winkler, A. Erdelyi, and B. Rinner. Trusteye.m4: Protecting the sensor - not the camera. In Proc. of AVSS, Seoul, August 2014.
[32]
T. Winkler and B. Rinner. Securing embedded smart cameras with trusted computing. In EURASIP JWCN, 2011.
[33]
T. Winkler and B. Rinner. Security and privacy protection in visual sensor networks: A survey. ACM Comp. Surv., 47(1), 2014.
[34]
N. Zhu, T. Diethe, M. Camplani, L. Tao, A. Burrows, N. Twomey, D. Kaleshi, M. Mirmehdi, P. Flach, and I. Craddock. Bridging e-health and the internet of things: The sphere project. IEEE Intel. Sys., 30(4):39--46, 2015.

Cited By

View all
  • (2023)Deep Learning-based Feature Fusion for Action Recognition Using Skeleton Information2023 International Conference on Robotics and Automation in Industry (ICRAI)10.1109/ICRAI57502.2023.10089577(1-6)Online publication date: 3-Mar-2023
  • (2023)IoT-Based Non-Intrusive Automated Driver Drowsiness Monitoring Framework for Logistics and Public Transport Applications to Enhance Road SafetyIEEE Access10.1109/ACCESS.2023.324400811(14385-14397)Online publication date: 2023
  • (2023)Review of the theory, principles, and design requirements of human-centric Internet of Things (IoT)Journal of Ambient Intelligence and Humanized Computing10.1007/s12652-023-04539-314:3(2827-2859)Online publication date: 4-Feb-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICDSC '16: Proceedings of the 10th International Conference on Distributed Smart Camera
September 2016
242 pages
ISBN:9781450347860
DOI:10.1145/2967413
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 September 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Edge computing
  2. Privacy and security protection
  3. White paper

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Austrian Research Promotion Agency (FFG)
  • European Union's Seventh Framework Programme for research, technological development and demonstration

Conference

ICDSC '16

Acceptance Rates

Overall Acceptance Rate 92 of 117 submissions, 79%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)1
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Deep Learning-based Feature Fusion for Action Recognition Using Skeleton Information2023 International Conference on Robotics and Automation in Industry (ICRAI)10.1109/ICRAI57502.2023.10089577(1-6)Online publication date: 3-Mar-2023
  • (2023)IoT-Based Non-Intrusive Automated Driver Drowsiness Monitoring Framework for Logistics and Public Transport Applications to Enhance Road SafetyIEEE Access10.1109/ACCESS.2023.324400811(14385-14397)Online publication date: 2023
  • (2023)Review of the theory, principles, and design requirements of human-centric Internet of Things (IoT)Journal of Ambient Intelligence and Humanized Computing10.1007/s12652-023-04539-314:3(2827-2859)Online publication date: 4-Feb-2023
  • (2022)Role of Edge Computing to Leverage IoT-Assisted AAL EcosystemResearch Anthology on Edge Computing Protocols, Applications, and Integration10.4018/978-1-6684-5700-9.ch030(594-618)Online publication date: 1-Apr-2022
  • (2022)Learning Phase Mask for Privacy-Preserving Passive Depth EstimationComputer Vision – ECCV 202210.1007/978-3-031-20071-7_30(504-521)Online publication date: 13-Nov-2022
  • (2021)Role of Edge Computing to Leverage IoT-Assisted AAL EcosystemApplications of Big Data in Large- and Small-Scale Systems10.4018/978-1-7998-6673-2.ch017(282-306)Online publication date: 2021
  • (2019)A Multi-sensor Based Physical Condition Estimator for Home HealthcareAdvances on Broad-Band Wireless Computing, Communication and Applications10.1007/978-3-030-33506-9_2(12-21)Online publication date: 18-Oct-2019
  • (2018)Ontology for a Panoptes buildingSemantic Web10.3233/SW-1802989:6(803-828)Online publication date: 1-Jan-2018
  • (2018)Fog Computing in Healthcare: A Review2018 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC.2018.8538671(01126-01131)Online publication date: Jun-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media