ABSTRACT
Nowadays the camera has developed into an indispensable and ubiquitous part of our life. It ensures the safety of people and their belongings, keeps records of special moments, or logs daily life. However, the ever-increasing amount of cameras surrounding us raised privacy concerns among people, who find themselves easily captured by a camera without themselves acknowledging it. To make matters worse, cameras, especially those on smart phones, are now more pervasive than ever before and can hardly be regulated as the recorders have full control of their cameras. Motivated by the privacy challenges originated from the ever-increasing and wide-spreading cameras, this paper presents the Real-time, Secure, and Privacy-aware Video Redaction System (ReSPonSe), which aims at protecting private information in personal videos according to permissions of people-in-video for other viewers to view them in the video. This system innovatively separates the production of videos into two stages: Encapsulation and Decapsulation. The first stage produces neutral videos in real-time while the second stage provides privacy-aware video to the viewer revealing private content of people-in-video who grants access rights to that viewer. The evaluation demonstrates the capability of this system to protect private information in videos with high efficiency and accuracy.
- Brandon Amos, Bartosz Ludwiczuk, and Mahadev Satyanarayanan. 2016. Open-Face: A general-purpose face recognition library with mobile applications. Technical Report. CMU-CS-16-118, CMU School of Computer Science.Google Scholar
- Joan Daemen and Vincent Rijmen. 2013. The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media. Google ScholarDigital Library
- Carsten Griwodz, Oliver Merkel, Jana Dittmann, and Ralf Steinmetz. 1998. Protecting VoD the easier way. In Proceedings of the sixth ACM international conference on Multimedia. ACM, 21--28. Google ScholarDigital Library
- Vasif Nabiyev and Asuman Günay. 2008. Towards a biometric purpose image filter according to skin detection. In Proceedings of the second international conference on problems of cybernetics and informatics.Google Scholar
- Pexels. 2017. Free stock photos Âů Pexels. https://www.pexels.com/Google Scholar
- Jeremy Schiff, Marci Meingast, Deirdre K Mulligan, Shankar Sastry, and Ken Goldberg. 2007. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Intelligent Robots and Systems, 2007. IROS 2007. IEEE/RSJ International Conference on. IEEE, 971--978.Google ScholarCross Ref
- Andrew Senior, Sharath Pankanti, Arun Hampapur, Lisa Brown, Ying-Li Tian, Ahmet Ekin, Jonathan Connell, Chiao Fe Shu, and Max Lu. 2005. Enabling video privacy through computer vision. IEEE Security & Privacy 3, 3 (2005), 50--57. Google ScholarDigital Library
- Jiayu Shu, Rui Zheng, and Pan Hui. 2016. Cardea: Context-aware visual privacy protection from pervasive cameras. arXiv preprint arXiv:1610.00889 (2016).Google Scholar
- Ralf Steinmetz and Klara Nahrstedt. 2013. Multimedia systems. Springer Science & Business Media. Google ScholarDigital Library
- Andreas Uhl and Andreas Pommer. 2004. Image and video encryption: from digital rights management to secured personal communication. Vol. 15. Springer Science & Business Media.Google Scholar
- Videezy. 2017. Videezy. https://www.videezy.com/Google Scholar
- Videvo. 2017. Free Stock Video Footage HD & 4K Clips Royalty-Free Videos. https://www.videvo.net/Google Scholar
- Junjue Wang, Brandon Amos, Anupam Das, Padmanabhan Pillai, Norman Sadeh, and Mahadev Satyanarayanan. 2017. A Scalable and Privacy-Aware IoT Service for Live Video Analytics. In Proceedings of the 8th ACM on Multimedia Systems Conference. ACM, 38--49. Google ScholarDigital Library
- Jehan Wickramasuriya, Mahesh Datt, Sharad Mehrotra, and Nalini Venkatasubramanian. 2004. Privacy protecting data collection in media spaces. In Proceedings of the 12th annual ACM international conference on Multimedia. ACM, 48--55. Google ScholarDigital Library
Index Terms
- ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System
Recommendations
RFID System Security Analysis, Response Strategies and Research Directions
ISPAW '11: Proceedings of the 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications WorkshopsRadio Frequency Identification(RFID) system is a contactless automatic identification system using small, low-cost RFID tags. It enables recognition of the tag information via radio frequency communication, by attaching an RFID tag to an animate or ...
On two RFID privacy notions and their relations
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on ...
The blocker tag: selective blocking of RFID tags for consumer privacy
CCS '03: Proceedings of the 10th ACM conference on Computer and communications securityWe propose the use of "selective blocking" by "blocker tags" as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing.While an ordinary RFID tag is a simple, cheap (e.g. five-cent) passive ...
Comments