Abstract
Preserving the privacy of people in video surveillance systems is quite challenging, and a significant amount of research has been done to solve this problem in recent times. Majority of existing techniques are based on detecting bodily cues such as face and/or silhouette and obscuring them so that people in the videos cannot be identified. We observe that merely hiding bodily cues is not enough for protecting identities of the individuals in the videos. An adversary, who has prior contextual knowledge about the surveilled area, can identify people in the video by exploiting the implicit inference channels such as behavior, place, and time. This article presents an anonymous surveillance system, called Watch Me from Distance (WMD), which advocates for outsourcing of surveillance video monitoring (similar to call centers) to the long-distance sites where professional security operators watch the video and alert the local site when any suspicious or abnormal event takes place. We find that long-distance monitoring helps in decoupling the contextual knowledge of security operators. Since security operators at the remote site could turn into adversaries, a trust computation model to determine the credibility of the operators is presented as an integral part of the proposed system. The feasibility study and experiments suggest that the proposed system provides more robust measures of privacy yet maintains surveillance effectiveness.
- A. Alamri, M. S. Hossain, A. Almogren, M. M. Hassan, K. Alnafjan, M. Zakariah, L. Seyam, and A. Alghamdi. 2016. QoS-adaptive service configuration framework for cloud-assisted video surveillance systems. Multimedia Tools Appl. 75, 21 (2016), 13333--13348. Google Scholar
Digital Library
- P. K. Atrey, A. El Saddik, and M. S. Kankanhalli. 2011. Effective multimedia surveillance using a human-centric approach. Multimedia Tools Appl. 51, 2 (2011), 697--721. Google Scholar
Digital Library
- M. Barhm, N. Qwasmi, F. Qureshi, and K. El Khatib. 2011. Negotiating privacy preferences in video surveillance systems. In Proceedings of the International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems. 511--521. Google Scholar
Digital Library
- C. A. Bhatt, P. K. Atrey, and M. S. Kankanhalli. 2013. A reward-and-punishment-based approach for concept detection using adaptive ontology rules. ACM Trans. Multimedia Comput. Commun. Appl. 9, 2, Article 10 (2013). Google Scholar
Digital Library
- M. Boyle, C. Edwards, and S. Greenberg. 2000. The effects of filtered video on awareness and privacy. In Proceedings of the ACM Conference on Computer Supported Cooperative Work. 1--10. Google Scholar
Digital Library
- J. Chaudhari, S. Cheung, and M. V. Venkatesh. 2007. Privacy protection for life-log video. In Proceedings of the IEEE Workshop on Signal Processing Applications for Public Security and Forensics. 1--5.Google Scholar
- D. Chen, Y. Chang, R. Yan, and J. Yang. 2007. Tools for protecting the privacy of specific individuals in video. EURASIP J. Appl. Sign. Process. 2007, 1 (2007), 075427. Google Scholar
Digital Library
- S.-C. S. Cheung, M. V. Venkatesh, J. K. Paruchuri, J. Zhao, and T. Nguyen. 2009. Protecting and managing privacy information in video surveillance systems. In Protecting Privacy in Video Surveillance, A. Senior (Ed.). Springer, London, 11--33.Google Scholar
- P. Dasic, J. Dasic, and B. Crvenkovic. 2016. Service models for cloud computing: Video surveillance as a service (VSaaS). Bull. Transilv. Univ. Brasov I 9 (58), 2 (2016), 83--90.Google Scholar
- H. M. Dee and S. A. Velastin. 2008. How close are we to solving the problem of automated visual surveillance? Mach. Vis. Appl. 19, 5--6 (2008), 329--343. Google Scholar
Digital Library
- F. Dufaux. 2011. Video scrambling for privacy protection in video surveillance: Recent results and validation framework. Soc. Photo-Opt. Instrum. Eng. Conf. Ser. 8063, 2 (2011).Google Scholar
Cross Ref
- D. A. Fidaleo, H. A. Nguyen, and M. Trivedi. 2004. The networked sensor tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In Proceedings of the ACM International Workshop on Video Surveillance 8 Sensor Networks. 46--53. Google Scholar
Digital Library
- A. Hampapur, L. Brown, J. Connell, A. Ekin, N. Haas, M. Lu, and S. Pankanti. 2005. Smart video surveillance: Exploring the concept of multiscale spatiotemporal tracking. IEEE Sign. Process. Mag. 22, 2 (2005), 38--51.Google Scholar
Cross Ref
- M. A. Hossain, P. K. Atrey, and A. El Saddik. 2009. Learning multisensor confidence using a reward-and-punishment mechanism. IEEE Trans. Instrum. Meas. 58, 5 (2009), 1525--1534.Google Scholar
- S. E. Hudson and I. Smith. 1996. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In Proceedings of the ACM Conference on Computer Supported Cooperative Work. 248--257. Google Scholar
Digital Library
- I. R. Khan, A. Hassan, S. Ahsan, S. Alshomrani, and G. Iqbal. 2017. Remote surveillance with reduced transmission overhead. In Proceedings of the 2nd International Conference on Frontiers of Sensors Technologies. 435--439.Google Scholar
- I. Kitahara, K. Kogure, and N. Hagita. 2004. Stealth vision for protecting privacy. In Proceedings of the International Conference on Pattern Recognition. 404--407. Google Scholar
Digital Library
- J. B. Oommen and L. Rueda. 2005. A formal analysis of why heuristic functions work. Artif. Intell. J. 164, 1--2 (2005), 1--22. Google Scholar
Digital Library
- S. Oh et al. 2011. A large-scale benchmark dataset for event recognition in surveillance video. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 3153--3160. Google Scholar
Digital Library
- M. K. Saini, P. K. Atrey, S. Mehrotra, and M. S. Kankanhalli. 2011. Anonymous surveillance. In Proceedings of the IEEE International Conference on Multimedia 8 Expo. 1--6. Google Scholar
Digital Library
- M. K. Saini, P. K. Atrey, S. Mehrotra, S. Emmanuel, and M. S. Kankanhalli. 2010. Privacy modeling in video data publication. In Proceedings of the IEEE International Conference on Multimedia 8 Expo. 60--65.Google Scholar
- M. K. Saini, X. Wang, P. K. Atrey, and M. S. Kankanhalli. 2012. Adaptive workload equalization in multi-camera surveillance systems. IEEE Trans. Multimedia 14, 3 (2012), 555--562. Google Scholar
Digital Library
- J. Schiff, M. Meingast, D. K. Mulligan, S. Sastry, and K. Goldberg. 2007. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Proceedings of the 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems. 971--978.Google Scholar
- H. Sohn, W. De Neve, and Y. M. Ro. 2011. Privacy protection in video surveillance systems: Analysis of subband-adaptive scrambling in JPEG XR. IEEE Trans. Circ. Syst. Vid. Technol. 21, 2 (2011), 170--177. Google Scholar
Digital Library
- B. Song, M. M. Hassan, Y. Tian, M. S. Hossain, and A. Alamri. 2016. Remote display solution for video surveillance in multimedia cloud. Multimedia Tools Appl. 75, 21 (2016), 13375--13396. Google Scholar
Digital Library
- B. Song, Y. Tian, and B. Zhou. 2014. Design and evaluation of remote video surveillance system on private cloud. In Proceedings of the International Symposium on Biometrics and Security Technologies. 256--262.Google Scholar
- E. Wallace and C. Diffley. 1988. CCTV Control Room Ergonomics. Technical Report 14/98, Police Scientific Development Branch, Hertfordshire, UK.Google Scholar
- J. Wickramasuriya, M. Datt, S. Mehrotra, and N. Venkatasubramanian. 2004. Privacy protecting data collection in media spaces. In Proceedings of the ACM International Conference on Multimedia. 48--55. Google Scholar
Digital Library
- W. Zhang, S.-C. S. Cheung, and M. Chen. 2005. Hiding privacy information in video surveillance system. In Proceedings of the IEEE International Conference on Image Processing, Vol. 3. II--868--71.Google Scholar
Index Terms
Watch Me from Distance (WMD): A Privacy-Preserving Long-Distance Video Surveillance System
Recommendations
Internet privacy concerns and beliefs about government surveillance - An empirical investigation
This U.S.-based research attempts to understand the relationships between users' perceptions about Internet privacy concerns, the need for government surveillance, government intrusion concerns, and the willingness to disclose personal information ...
Track me, track me not
No correlation between support and consent to state and private surveillance.Support for surveillance is nuanced with respect to different types of surveillance.State surveillance more consensual than private sector surveillance.Anti-terror more ...
W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video
Huge amounts of video are being recorded every day by surveillance systems. Since video is capable of recording and preserving an enormous amount of information which can be used in many applications, it is worth examining the degree of privacy loss ...






Comments