scispace - formally typeset
Journal ArticleDOI

User-centric privacy awareness in video surveillance

Thomas Winkler, +1 more
- 01 Mar 2012 - 
- Vol. 18, Iss: 2, pp 99-121
Reads0
Chats0
TLDR
A model that allows users to directly interact with specially designed, trustworthy cameras and provide direct feedback about the tasks that are executed by the camera and how privacy-sensitive data is handled is presented.
Abstract
Especially in urban environments, video cameras have become omnipresent. Supporters of video surveillance argue that it is an excellent tool for many applications including crime prevention and law enforcement. While this is certainly true, it must be questioned if sufficient efforts are made to protect the privacy of monitored people. Privacy concerns are often set aside when compared to public safety and security. One reaction to this situation is emerging: community-based efforts where citizens register and map surveillance cameras in their environment. Our study is inspired by this idea and proposes a user-specific and location-aware privacy awareness system. Using conventional smartphones, users not only can contribute to the camera maps, but also use community-collected data to be alerted of potential privacy violations. In our model, we define different levels of privacy awareness. For the highest level, we present a mechanism that allows users to directly interact with specially designed, trustworthy cameras. These cameras provide direct feedback about the tasks that are executed by the camera and how privacy-sensitive data is handled. A hardware security chip that is integrated into the camera is used to ensure authenticity, integrity and freshness of the provided camera status information.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Security and Privacy Protection in Visual Sensor Networks: A Survey

TL;DR: An overview of the characteristics of VSN applications, the involved security threats and attack scenarios, and the major security challenges is presented, and a central contribution of this survey is the classification of V SN security aspects into data-centric, node-centred, network-focused, and user-centric security.
Proceedings ArticleDOI

Using warping for privacy protection in video surveillance

TL;DR: This paper proposes an algorithm based on well-known warping techniques (common for animation and artistic purposes) to obfuscate faces in video surveillance, aiming to overcome shortcomings in tools for protection of visual privacy.
Journal ArticleDOI

An efficient privacy protection scheme for data security in video surveillance

TL;DR: A novel and efficient privacy protection scheme for data security in video surveillance, which jointly addresses several key challenges, including de-identification, behavior preservation, recoverability, and compressibility in one unified system is proposed.
Proceedings ArticleDOI

I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios

TL;DR: This work designs and implements low-cost locators (visual, auditory, and contextualized pictures) to help people physically find nearby IoT devices and found that these locators greatly reduced people's search time over a baseline of no locators.
Proceedings ArticleDOI

Scrambling faces for privacy protection using background self-similarities

TL;DR: A novel scrambling procedure is proposed for protecting privacy sensitive image regions, which encodes the sensitive data in a parametric form, exploiting the visual information in the remaining part of the image.
References
More filters
Proceedings ArticleDOI

A Privacy Awareness System for Ubiquitous Computing Environments

TL;DR: In this paper, the authors introduce a privacy awareness system targeted at ubiquitous computing environments that allows data collectors to both announce and implement data usage policies, as well as providing data subjects with technical means to keep track of their personal information as it is stored, used, and possibly removed from the system.
Proceedings ArticleDOI

Loud and Clear: Human-Verifiable Authentication Based on Audio

TL;DR: In this article, the authors investigate the use of audio for human-assisted authentication of previously unassociated devices and develop and evaluate a system called Loud-and-Clear (L&C) which places very little demand on the human user.
Journal ArticleDOI

Enabling video privacy through computer vision

TL;DR: The authors' privacy console manages operator access to different versions of video-derived data according to access-control lists and their PrivacyCam is a smart camera that produces a video stream with privacy-intrusive information already removed.
Proceedings ArticleDOI

Privacy protecting data collection in media spaces

TL;DR: A novel way of combining sensor technology with traditional video surveillance in building a privacy protecting framework that exploits the strengths of these modalities and complements their individual limitations is proposed.
Related Papers (5)