Skip to main content

Privacy and Security in Video Surveillance

  • Chapter
Intelligent Multimedia Surveillance

Abstract

Video surveillance systems are usually installed to increase the safety and security of people or property in the monitored areas. Typical threat scenarios are robbery, vandalism, shoplifting or terrorism. Other application scenarios are more intimate and private such as home monitoring or assisted living. For a long time, it was accepted that the potential benefits of video surveillance go hand in hand with a loss of personal privacy. However, with the on-board processing capabilities of modern embedded systems it becomes possible to compensate this privacy loss by making security and privacy protection inherent features of video surveillance cameras. In the first part of this chapter, we motivate the need for the integration of security and privacy features, we discuss fundamental requirements and provide a comprehensive review of the state of the art. The second part presents the TrustCAM prototype system where a dedicated hardware security module is integrated into a camera system to achieve a high level of security. The chapter is concluded by a summary of open research issues and an outlook to future trends.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    TrustEYE website: http://trusteye.aau.at.

References

  1. Albanesi, M.G., Ferretti, M., Guerrini, F.: A taxonomy for image authentication techniques and its application to the current state of the art. In: Proceedings of the International Conference on Image Analysis and Processing, pp. 535–540 (2001)

    Chapter  Google Scholar 

  2. Atrey, P.K., Yan, W.-Q., Chang, E.-C., Kankanhalli, M.S.: A hierarchical signature scheme for robust video authentication using secret sharing. In: Proceedings of the International Conference on Multimedia Modelling, pp. 330–337 (2004)

    Google Scholar 

  3. Atrey, P.K., Yan, W.-Q., Kankanhalli, M.S.: A scalable signature scheme for video authentication. Multimed. Tools Appl. 34(1), 107–135 (2006)

    Article  Google Scholar 

  4. Baaziz, N., Lolo, N., Padilla, O., Petngang, F.: Security and privacy protection for automated video surveillance. In: Proceedings of the International Symposium on Signal Processing and Information Technology, pp. 17–22 (2007)

    Google Scholar 

  5. Bartolini, F., Tefas, A., Barni, M., Pitas, I.: Image authentication techniques for surveillance applications. Proc. IEEE 89(10), 1403–1418 (2001)

    Article  Google Scholar 

  6. Boult, T.E.: PICO: privacy through invertible cryptographic obscuration. In: Proceedings of the Workshop on Computer Vision for Interactive and Intelligent Environments, pp. 27–38 (2005)

    Chapter  Google Scholar 

  7. Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: Proceedings of the Conference on Computer Supported Cooperative Work, pp. 1–10 (2000)

    Google Scholar 

  8. Bramberger, M., Brunner, J., Rinner, B., Schwabach, H.: Real-time video analysis on an embedded smart camera for traffic surveillance. In: IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 174–181 (2004)

    Google Scholar 

  9. Brassil, J.: Using mobile communications to assert privacy from video surveillance. In: Proceedings of the Parallel and Distributed Processing Symposium, p. 8 (2005)

    Google Scholar 

  10. CARE Consortium: CARE – ambient assisted living: safe private homes for elderly persons. http://care-aal.eu/. Last visited March 2013

  11. Cavallaro, A.: Adding privacy constraints to video-based applications. In: Proceedings of the European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology, p. 8 (2004)

    Google Scholar 

  12. Cavallaro, A.: Privacy in video surveillance. IEEE Signal Process. Mag. 24(2), 168–169 (2007)

    Article  MathSciNet  Google Scholar 

  13. Challener, D., Yoder, K., Catherman, R., Safford, D., van Doorn, L.: A Practical Guide to Trusted Computing. IBM Press, Raleigh (2008)

    Google Scholar 

  14. Chattopadhyay, A., Boult, T.E.: PrivacyCam: a privacy preserving camera using uClinux on the Blackfin DSP. In: Proceedings of the International Conference on Computer Vision and Pattern Recognition, pp. 1–8 (2007)

    Google Scholar 

  15. Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP J. Appl. Signal Process. 2007(1), 107–116 (2007)

    Google Scholar 

  16. Cheung, S.-C.S., Zhao, J., Venkatesh, M.V.: Efficient object-based video inpainting. In: Proceedings of the International Conference on Image Processing, pp. 705–708 (2006)

    Google Scholar 

  17. Cheung, S.-C.S., Paruchuri, J.K., Nguyen, T.P.: Managing privacy data in pervasive camera networks. In: Proceedings of the International Conference on Image Processing, pp. 1676–1679 (2008)

    Google Scholar 

  18. Chinomi, K., Nitta, N., Ito, Y., Babaguchi, N.: PriSurv: privacy protected video surveillance system using adaptive visual abstraction. In: Proceedings of the International Multimedia Modeling Conference, pp. 144–154 (2008)

    Google Scholar 

  19. Davis, D.: Defective sign & encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML. In: Proceedings of the USENIX Technical Conference, pp. 65–78 (2001)

    Google Scholar 

  20. Dawson, D., Derby, P., Doyle, A., Fonio, C., Huey, L., Johanson, M., Leman-Langlois, S., Lippert, R., Lyon, D., Pratte, A.-M., Smith, E., Walby, K., Wilkinson, B.: A report on camera surveillance in Canada (part two): surveillance camera awareness network. Technical report, The Surveillance Project (2009)

    Google Scholar 

  21. Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop, pp. 160–166 (2006)

    Google Scholar 

  22. Dufaux, F., Ebrahimi, T.: A framework for the validation of privacy protection solutions in video surveillance. In: Proceedings of the International Conference on Multimedia and Expo, pp. 66–71 (2010)

    Google Scholar 

  23. Farmer, D., Mann, C.C.: Surveillance nation (part I). Technol. Rev. 4, 34–43 (2003)

    Google Scholar 

  24. Fidaleo, D.A., Nguyen, H.-A., Trivedi, M.: The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In: Proceedings of the International Workshop on Video Surveillance and Sensor Networks, pp. 46–53 (2004)

    Chapter  Google Scholar 

  25. Fleck, S., Straßer, W.: Smart camera based monitoring system and its application to assisted living. Proc. IEEE 96(10), 1698–1714 (2008)

    Article  Google Scholar 

  26. Fleck, S., Straßer, W.: Towards secure and privacy sensitive surveillance. In: Proceedings of the International Conference on Distributed Smart Cameras, p. 7 (2010)

    Google Scholar 

  27. Friedman, G.L.: The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans. Consum. Electron. 39(4), 905–910 (1993)

    Article  Google Scholar 

  28. Gross, R., Sweeney, L., De Torre, F., Baker, S.: Model-based face de-identification. In: Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop, p. 8 (2006)

    Google Scholar 

  29. He, D., Sun, Q., Tian, Q.: A secure and robust object-based video authentication system. EURASIP J. Adv. Signal Process. 2004(14), 2185–2200 (2004)

    Article  Google Scholar 

  30. Helten, F., Fischer, B.: What do people think about CCTV? Findings from a Berlin survey. Technical report, Berlin Institute for Social Research (2004)

    Google Scholar 

  31. Krempl, S., Wilkens, A.: Datenschützer beanstanden Videoüberwachung in ECE-Einkaufszentren. http://heise.de/-1187205 (2011). Last visited March 2013

  32. Li, G., Ito, Y., Yu, X., Nitta, N., Babaguchi, N.: Recoverable privacy protection for video content distribution. EURASIP J. Inf. Secur. 2009, 11 (2009)

    Google Scholar 

  33. Luo, Y., Ye, S., Cheung, S.-C.S.: Anonymous subject identification in privacy-aware video surveillance. In: Proceedings of the International Conference on Multimedia and Expo, pp. 83–88 (2010)

    Google Scholar 

  34. Martin, A.: The ten page introduction to trusted computing. Technical report RR-08-11, Oxford University Computing Laboratory (December 2008)

    Google Scholar 

  35. Martínez-Ponte, I., Desurmont, X., Meessen, J., Delaigle, J.-F.: Robust human face hiding ensuring privacy. In: Proceedings of the International Workshop on Image Analysis for Multimedia Interactive Services, p. 4 (2005)

    Google Scholar 

  36. Memon, N., Wong P.W.: Protecting digital media content. Commun. ACM 41(7), 35–43 (1998)

    Article  Google Scholar 

  37. Mohanty, S.P.: A secure digital camera architecture for integrated real-time digital rights management. J. Syst. Archit. 55(10–12), 468–480 (2009)

    Article  Google Scholar 

  38. Moncrieff, S., Venkatesh, S., West, G.: Dynamic privacy in public surveillance. IEEE Comput. 42(9), 22–28 (2009)

    Article  Google Scholar 

  39. Ney, S., Pichler, K.: Video surveillance in Austria. Technical report, Interdisciplinary Centre for Comparative Research in the Social Sciences, Austria (2002)

    Google Scholar 

  40. Norris, C.: A review of the increased use of CCTV and video-surveillance for crime prevention purposes in Europe. Technical report, Department of Sociological Studies, University of Sheffield, United Kingdom (2009)

    Google Scholar 

  41. Pirker, M., Tögl, R., Hein, D., Danner, P.: A PrivacyCA for anonymity and trust. In: Proceedings of the International Conference on Trust and Trustworthy Computing, pp. 101–119 (2009)

    Google Scholar 

  42. Qureshi, F.Z.: Object-video streams for preserving privacy in video surveillance. In: Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance, pp. 442–447 (2009)

    Google Scholar 

  43. Qusquater, J.-J., Macq, B., Joye, M., Degand, N., Bernard, A.: Practical solution to authentication of images with a secure camera. Storage Retr. Image Video Databases 3022(1), 290–297 (1997)

    Article  Google Scholar 

  44. Rahman, S.M.M., Hossain, M.A., Mouftah, H., El Saddik, A., Okamoto, E.: A real-time privacy-sensitive data hiding approach based on chaos cryptography. In: Proceedings of the International Conference on Multimedia and Expo, pp. 72–77 (2010)

    Google Scholar 

  45. Saini, M., Atrey, P.K., Mehrotra, S., Emmanuel, S., Kankanhalli, M.S.: Privacy modeling for video data publication. In: Proceedings of the International Conference on Multimedia and Expo, pp. 60–65 (2010)

    Google Scholar 

  46. Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.S.: Anonymous surveillance. In: Proceedings of the International Workshop on Advances in Automated Multimedia Surveillance for Public Safety, p. 6 (2011)

    Google Scholar 

  47. Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.S.: Hiding identity leakage channels for publication of surveillance video. In: Transactions on Data Hiding and Multimedia Security (2011)

    Google Scholar 

  48. Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.S.: W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video. Springer Int. J. Multimed. Tools Appl. (August), 24 (2012)

    Google Scholar 

  49. Schaffer, M., Schartner, P.: Video surveillance: a distributed approach to protect privacy. In: Proceedings of the International Conference on Communications and Multimedia Security, pp. 140–149 (2007)

    Google Scholar 

  50. Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.Y.: Respectful cameras: selecting visual markers in real-time to address privacy concerns. In: Proceedings of the International Conference on Intelligent Robots and Systems, pp. 971–978 (2007)

    Google Scholar 

  51. Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.-L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Secur. Priv. 3(3), 50–57 (2005)

    Article  Google Scholar 

  52. Serpanos, D.N., Papalambrou, A.: Security and privacy in distributed smart cameras. Proc. IEEE 96(10), 1678–1687 (2008)

    Article  Google Scholar 

  53. Spindler, T., Wartmann, C., Hovestadt, L., Roth, D., van Gool, L., Steffen, A.: Privacy in video surveilled areas. In: Proceedings of the International Conference on Privacy, Security and Trust, p. 10 (2006)

    Google Scholar 

  54. Tansuriyavong, S., Hanaki, S.: Privacy protection by concealing persons in circumstantial video image. In: Proceedings of the Workshop on Perceptive User Interfaces, p. 4 (2001)

    Google Scholar 

  55. Texas Instruments. BeagleBoard website. http://www.beagleboard.org. Last visited March 2013

  56. Troncoso-Pastoriza, J.R., Pérez-Freire, L., Pérez-González, F.: Videosurveillance and privacy: covering the two sides of the mirror with DRM. In: Proceedings of the Workshop on Digital Rights Management, pp. 83–94 (2009)

    Google Scholar 

  57. Trusted Computing Group. TCG Software Stack (TSS) Specification, Version 1.2, Level 1, Errata A. http://www.trustedcomputinggroup.org/resources/tcg_software_stack_tss_specification (March 2007). Last visited March 2013

  58. Trusted Computing Group. TPM Main Specification 1.2, Level 2, Revision 116. http://www.trustedcomputinggroup.org/developers/trusted_platform_module (July 2007). Last visited March 2013

  59. Vagts, H., Bauer, A.: Privacy-aware object representation for surveillance systems. In: Proceedings of the International Conference on Advanced Video and Signal Based Surveillance, pp. 601–608 (2010)

    Google Scholar 

  60. Vagts, H., Beyerer, J.: Security and privacy challenges in modern surveillance systems. In: Proceedings of the Future Security Research Conference, pp. 94–116 (2009)

    Google Scholar 

  61. Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy protecting data collection in media spaces. In: Proceedings of the International Conference on Multimedia, pp. 48–55 (2004)

    Google Scholar 

  62. Williams, A., Ganesan, D., Hanson, A.: Aging in place: fall detection and localization in a distributed smart camera network. In: Proceedings of the International Conference on Multimedia, pp. 892–901 (2007)

    Google Scholar 

  63. Winkler, T., Rinner, B.: A systematic approach towards user-centric privacy and security for smart camera networks. In: Proceedings of the International Conference on Distributed Smart Cameras, p. 8 (2010)

    Google Scholar 

  64. Winkler, T., Rinner, B.: TrustCAM: security and privacy-protection for an embedded smart camera based on trusted computing. In: Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance, pp. 593–600 (2010)

    Google Scholar 

  65. Winkler, T., Rinner, B.: Securing embedded smart cameras with trusted computing. EURASIP J. Wirel. Commun. Netw. 2011, 20 (2011)

    Article  Google Scholar 

  66. Winkler, T., Rinner, B.: User centric privacy awareness in video surveillance. Multimed. Syst. 18(2), 99–121 (2012)

    Article  Google Scholar 

  67. Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE/ACM Trans. Netw. 7(4), 502–513 (1999)

    Article  Google Scholar 

  68. Yabuta, K., Kitazawa, H., Tanaka, T.: A new concept of security camera monitoring with privacy protection by masking moving objects. In: Proceedings of the International Pacific-Rim Conference on Multimedia, pp. 831–842 (2005)

    Google Scholar 

  69. Ye, S., Luo, Y., Zhao, J., Cheung, S.-C.S.: Anonymous biometric access control. EURASIP J. Inf. Secur. 2009, 18 (2009)

    Google Scholar 

Download references

Acknowledgements

This work was performed as part of the project TrustEYE: Trustworthy Sensing and Cooperation in Visual Sensor Networks. Footnote 1 The work was supported by funding from the European Regional Development Fund (ERDF) and the Carinthian Economic Promotion Fund (KWF) under grant KWF-3520/23312/35521.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Winkler .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Winkler, T., Rinner, B. (2013). Privacy and Security in Video Surveillance. In: Atrey, P., Kankanhalli, M., Cavallaro, A. (eds) Intelligent Multimedia Surveillance. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41512-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41512-8_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41511-1

  • Online ISBN: 978-3-642-41512-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics