Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1501434.1501469acmotherconferencesArticle/Chapter ViewAbstractPublication PagespstConference Proceedingsconference-collections
research-article

Privacy in video surveilled areas

Published: 30 October 2006 Publication History

Abstract

We present a system prototype for self-determination and privacy enhancement in video surveilled areas by integrating computer vision and cryptographic techniques into networked building automation systems. This paper describes research work that has been done within the first half of the collaborative blue-c-II project and is conducted by an interdisciplinary team of researchers. Persons in a video stream control their visibility on a per-viewer base and can choose to allow either the real view or an obscured image to be seen. The parts of the video stream that show a person are protected by an AES cipher and can be sent over untrusted networks. Experimental results are presented by the example of a meeting room scenario. The paper concludes with remarks on the usability and encountered problems.

References

[1]
Axis network cameras. http://www.axis.com.
[2]
M. B. Capellades, D. Doermann, D. DeMenthon, and R. Chellappa. An appearance based approach for human and object tracking. In ICIP, 2003.
[3]
F. Dufaux and T. Ebrahimi. Smart video surveillance system preserving privacy. In Image and Video Communications and Processing, 2005.
[4]
F. Duffy. The intelligent building in europe. In DEGW London, 1991.
[5]
Elphel network cameras. http://www.elphel.com.
[6]
Elphel open source. http://sourceforge.net/projects/elphel.
[7]
EMITALL Surveillance SA. http://www.emitall.com.
[8]
Eptascape Inc. http://www.eptascape.com.
[9]
N. Ferguson and B. Schneier. Practical Cryptography. Wiley, 2003.
[10]
BlueC II Project. http://blue-c-ii.ethz.ch.
[11]
Adobe (former Macromedia) FLASH. http://www.macromedia.com.
[12]
Britain will be first country to monitor every car journey. news.independent.co.uk/uk/transport/article334686.ece.
[13]
A. Mittal and L. S. Davis. M2tracker: A multi-view approach to segmenting and tracking people in a cluttered scene using region-based stereo. May 2002.
[14]
The openssl library implements ssl and tls protocols. http://www.openssl.org.
[15]
OSGi Service Platform. http://www.osgi.org.
[16]
Jeremy Bentham's Panopticon. http://en.wikipedia.org/wiki/Panopticon.
[17]
RaumComputer building automation system. http://www.raumcomputer.de.
[18]
The Register: CCTV Peeping Toms jailed. www.theregister.co.uk/2006/01/13/cctv_men_jailed/.
[19]
D. Roth, P. Doubek, and L. Van Gool. Bayesian pixel classification for human tracking. In MOTION 2005, January 2005.
[20]
A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, A. Ekin, J. Connell, C. F. Shu, and M. Lu. Enabling video privacy through computer vision. IEEE Security and Privacy, 03(3):50--57, 2005.
[21]
M. Sorkin. Variations on a Theme Park: The New American City and the End of Public Space. Hill and Wang, 1992.
[22]
C. Stauffer and W. Grimson. Adaptive background mixture models for real-time tracking. In CVPR, 1999.
[23]
K. Strehlke. Merging building automation systems and multimedia systems - a framework for computer integrated buidlings. In Innovation in Architecture, Engineering and Construction, 2005.
[24]
K. Strehlke, M. Ochsendorf, and U. Bahr. Generative interfaces and scenarios for intelligent architecture - a framework for computer integrated buildings. In Generative Art Conference, 2004.
[25]
S. Swinford. The Sunday Times - Asbo TV helps residents watch out. http://www.timesonline.co.uk/article/0,2087-1974974,00.html, January 08 2006.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
October 2006
389 pages
ISBN:1595936041
DOI:10.1145/1501434
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. building automation
  2. computer vision
  3. cryptography
  4. surveillance

Qualifiers

  • Research-article

Conference

PST06
PST06: International Conference on Privacy, Security and Trust
October 30 - November 1, 2006
Ontario, Markham, Canada

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2014)Security and Privacy Protection in Visual Sensor NetworksACM Computing Surveys10.1145/254588347:1(1-42)Online publication date: 1-May-2014
  • (2014)W3-privacyMultimedia Tools and Applications10.1007/s11042-012-1207-968:1(135-158)Online publication date: 1-Jan-2014
  • (2012)Adaptive transformation for robust privacy protection in video surveillanceAdvances in Multimedia10.1155/2012/6396492012(4-4)Online publication date: 1-Jan-2012
  • (2011)User-centric privacy awareness in video surveillanceMultimedia Systems10.1007/s00530-011-0241-118:2(99-121)Online publication date: 1-Jul-2011
  • (2010)A systematic approach towards user-centric privacy and security for smart camera networksProceedings of the Fourth ACM/IEEE International Conference on Distributed Smart Cameras10.1145/1865987.1866009(133-141)Online publication date: 31-Aug-2010

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media