skip to main content
research-article

Watch Me from Distance (WMD): A Privacy-Preserving Long-Distance Video Surveillance System

Authors Info & Claims
Published:05 June 2019Publication History
Skip Abstract Section

Abstract

Preserving the privacy of people in video surveillance systems is quite challenging, and a significant amount of research has been done to solve this problem in recent times. Majority of existing techniques are based on detecting bodily cues such as face and/or silhouette and obscuring them so that people in the videos cannot be identified. We observe that merely hiding bodily cues is not enough for protecting identities of the individuals in the videos. An adversary, who has prior contextual knowledge about the surveilled area, can identify people in the video by exploiting the implicit inference channels such as behavior, place, and time. This article presents an anonymous surveillance system, called Watch Me from Distance (WMD), which advocates for outsourcing of surveillance video monitoring (similar to call centers) to the long-distance sites where professional security operators watch the video and alert the local site when any suspicious or abnormal event takes place. We find that long-distance monitoring helps in decoupling the contextual knowledge of security operators. Since security operators at the remote site could turn into adversaries, a trust computation model to determine the credibility of the operators is presented as an integral part of the proposed system. The feasibility study and experiments suggest that the proposed system provides more robust measures of privacy yet maintains surveillance effectiveness.

References

  1. A. Alamri, M. S. Hossain, A. Almogren, M. M. Hassan, K. Alnafjan, M. Zakariah, L. Seyam, and A. Alghamdi. 2016. QoS-adaptive service configuration framework for cloud-assisted video surveillance systems. Multimedia Tools Appl. 75, 21 (2016), 13333--13348. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. K. Atrey, A. El Saddik, and M. S. Kankanhalli. 2011. Effective multimedia surveillance using a human-centric approach. Multimedia Tools Appl. 51, 2 (2011), 697--721. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Barhm, N. Qwasmi, F. Qureshi, and K. El Khatib. 2011. Negotiating privacy preferences in video surveillance systems. In Proceedings of the International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems. 511--521. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. A. Bhatt, P. K. Atrey, and M. S. Kankanhalli. 2013. A reward-and-punishment-based approach for concept detection using adaptive ontology rules. ACM Trans. Multimedia Comput. Commun. Appl. 9, 2, Article 10 (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Boyle, C. Edwards, and S. Greenberg. 2000. The effects of filtered video on awareness and privacy. In Proceedings of the ACM Conference on Computer Supported Cooperative Work. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Chaudhari, S. Cheung, and M. V. Venkatesh. 2007. Privacy protection for life-log video. In Proceedings of the IEEE Workshop on Signal Processing Applications for Public Security and Forensics. 1--5.Google ScholarGoogle Scholar
  7. D. Chen, Y. Chang, R. Yan, and J. Yang. 2007. Tools for protecting the privacy of specific individuals in video. EURASIP J. Appl. Sign. Process. 2007, 1 (2007), 075427. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S.-C. S. Cheung, M. V. Venkatesh, J. K. Paruchuri, J. Zhao, and T. Nguyen. 2009. Protecting and managing privacy information in video surveillance systems. In Protecting Privacy in Video Surveillance, A. Senior (Ed.). Springer, London, 11--33.Google ScholarGoogle Scholar
  9. P. Dasic, J. Dasic, and B. Crvenkovic. 2016. Service models for cloud computing: Video surveillance as a service (VSaaS). Bull. Transilv. Univ. Brasov I 9 (58), 2 (2016), 83--90.Google ScholarGoogle Scholar
  10. H. M. Dee and S. A. Velastin. 2008. How close are we to solving the problem of automated visual surveillance? Mach. Vis. Appl. 19, 5--6 (2008), 329--343. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. Dufaux. 2011. Video scrambling for privacy protection in video surveillance: Recent results and validation framework. Soc. Photo-Opt. Instrum. Eng. Conf. Ser. 8063, 2 (2011).Google ScholarGoogle ScholarCross RefCross Ref
  12. D. A. Fidaleo, H. A. Nguyen, and M. Trivedi. 2004. The networked sensor tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In Proceedings of the ACM International Workshop on Video Surveillance 8 Sensor Networks. 46--53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Hampapur, L. Brown, J. Connell, A. Ekin, N. Haas, M. Lu, and S. Pankanti. 2005. Smart video surveillance: Exploring the concept of multiscale spatiotemporal tracking. IEEE Sign. Process. Mag. 22, 2 (2005), 38--51.Google ScholarGoogle ScholarCross RefCross Ref
  14. M. A. Hossain, P. K. Atrey, and A. El Saddik. 2009. Learning multisensor confidence using a reward-and-punishment mechanism. IEEE Trans. Instrum. Meas. 58, 5 (2009), 1525--1534.Google ScholarGoogle Scholar
  15. S. E. Hudson and I. Smith. 1996. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In Proceedings of the ACM Conference on Computer Supported Cooperative Work. 248--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. I. R. Khan, A. Hassan, S. Ahsan, S. Alshomrani, and G. Iqbal. 2017. Remote surveillance with reduced transmission overhead. In Proceedings of the 2nd International Conference on Frontiers of Sensors Technologies. 435--439.Google ScholarGoogle Scholar
  17. I. Kitahara, K. Kogure, and N. Hagita. 2004. Stealth vision for protecting privacy. In Proceedings of the International Conference on Pattern Recognition. 404--407. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. B. Oommen and L. Rueda. 2005. A formal analysis of why heuristic functions work. Artif. Intell. J. 164, 1--2 (2005), 1--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Oh et al. 2011. A large-scale benchmark dataset for event recognition in surveillance video. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 3153--3160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. K. Saini, P. K. Atrey, S. Mehrotra, and M. S. Kankanhalli. 2011. Anonymous surveillance. In Proceedings of the IEEE International Conference on Multimedia 8 Expo. 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. K. Saini, P. K. Atrey, S. Mehrotra, S. Emmanuel, and M. S. Kankanhalli. 2010. Privacy modeling in video data publication. In Proceedings of the IEEE International Conference on Multimedia 8 Expo. 60--65.Google ScholarGoogle Scholar
  22. M. K. Saini, X. Wang, P. K. Atrey, and M. S. Kankanhalli. 2012. Adaptive workload equalization in multi-camera surveillance systems. IEEE Trans. Multimedia 14, 3 (2012), 555--562. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Schiff, M. Meingast, D. K. Mulligan, S. Sastry, and K. Goldberg. 2007. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Proceedings of the 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems. 971--978.Google ScholarGoogle Scholar
  24. H. Sohn, W. De Neve, and Y. M. Ro. 2011. Privacy protection in video surveillance systems: Analysis of subband-adaptive scrambling in JPEG XR. IEEE Trans. Circ. Syst. Vid. Technol. 21, 2 (2011), 170--177. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. B. Song, M. M. Hassan, Y. Tian, M. S. Hossain, and A. Alamri. 2016. Remote display solution for video surveillance in multimedia cloud. Multimedia Tools Appl. 75, 21 (2016), 13375--13396. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. B. Song, Y. Tian, and B. Zhou. 2014. Design and evaluation of remote video surveillance system on private cloud. In Proceedings of the International Symposium on Biometrics and Security Technologies. 256--262.Google ScholarGoogle Scholar
  27. E. Wallace and C. Diffley. 1988. CCTV Control Room Ergonomics. Technical Report 14/98, Police Scientific Development Branch, Hertfordshire, UK.Google ScholarGoogle Scholar
  28. J. Wickramasuriya, M. Datt, S. Mehrotra, and N. Venkatasubramanian. 2004. Privacy protecting data collection in media spaces. In Proceedings of the ACM International Conference on Multimedia. 48--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. W. Zhang, S.-C. S. Cheung, and M. Chen. 2005. Hiding privacy information in video surveillance system. In Proceedings of the IEEE International Conference on Image Processing, Vol. 3. II--868--71.Google ScholarGoogle Scholar

Index Terms

  1. Watch Me from Distance (WMD): A Privacy-Preserving Long-Distance Video Surveillance System

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 15, Issue 2
      May 2019
      375 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3339884
      Issue’s Table of Contents

      Copyright © 2019 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 June 2019
      • Accepted: 1 February 2019
      • Revised: 1 December 2018
      • Received: 1 June 2018
      Published in tomm Volume 15, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!