skip to main content
10.1145/1501434.1501469acmotherconferencesArticle/Chapter ViewAbstractPublication PagespstConference Proceedingsconference-collections
research-article

Privacy in video surveilled areas

Published:30 October 2006Publication History

ABSTRACT

We present a system prototype for self-determination and privacy enhancement in video surveilled areas by integrating computer vision and cryptographic techniques into networked building automation systems. This paper describes research work that has been done within the first half of the collaborative blue-c-II project and is conducted by an interdisciplinary team of researchers. Persons in a video stream control their visibility on a per-viewer base and can choose to allow either the real view or an obscured image to be seen. The parts of the video stream that show a person are protected by an AES cipher and can be sent over untrusted networks. Experimental results are presented by the example of a meeting room scenario. The paper concludes with remarks on the usability and encountered problems.

References

  1. Axis network cameras. http://www.axis.com.Google ScholarGoogle Scholar
  2. M. B. Capellades, D. Doermann, D. DeMenthon, and R. Chellappa. An appearance based approach for human and object tracking. In ICIP, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  3. F. Dufaux and T. Ebrahimi. Smart video surveillance system preserving privacy. In Image and Video Communications and Processing, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  4. F. Duffy. The intelligent building in europe. In DEGW London, 1991.Google ScholarGoogle Scholar
  5. Elphel network cameras. http://www.elphel.com.Google ScholarGoogle Scholar
  6. Elphel open source. http://sourceforge.net/projects/elphel.Google ScholarGoogle Scholar
  7. EMITALL Surveillance SA. http://www.emitall.com.Google ScholarGoogle Scholar
  8. Eptascape Inc. http://www.eptascape.com.Google ScholarGoogle Scholar
  9. N. Ferguson and B. Schneier. Practical Cryptography. Wiley, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. BlueC II Project. http://blue-c-ii.ethz.ch.Google ScholarGoogle Scholar
  11. Adobe (former Macromedia) FLASH. http://www.macromedia.com.Google ScholarGoogle Scholar
  12. Britain will be first country to monitor every car journey. news.independent.co.uk/uk/transport/article334686.ece.Google ScholarGoogle Scholar
  13. A. Mittal and L. S. Davis. M2tracker: A multi-view approach to segmenting and tracking people in a cluttered scene using region-based stereo. May 2002.Google ScholarGoogle Scholar
  14. The openssl library implements ssl and tls protocols. http://www.openssl.org.Google ScholarGoogle Scholar
  15. OSGi Service Platform. http://www.osgi.org.Google ScholarGoogle Scholar
  16. Jeremy Bentham's Panopticon. http://en.wikipedia.org/wiki/Panopticon.Google ScholarGoogle Scholar
  17. RaumComputer building automation system. http://www.raumcomputer.de.Google ScholarGoogle Scholar
  18. The Register: CCTV Peeping Toms jailed. www.theregister.co.uk/2006/01/13/cctv_men_jailed/.Google ScholarGoogle Scholar
  19. D. Roth, P. Doubek, and L. Van Gool. Bayesian pixel classification for human tracking. In MOTION 2005, January 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, A. Ekin, J. Connell, C. F. Shu, and M. Lu. Enabling video privacy through computer vision. IEEE Security and Privacy, 03(3):50--57, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Sorkin. Variations on a Theme Park: The New American City and the End of Public Space. Hill and Wang, 1992.Google ScholarGoogle Scholar
  22. C. Stauffer and W. Grimson. Adaptive background mixture models for real-time tracking. In CVPR, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  23. K. Strehlke. Merging building automation systems and multimedia systems - a framework for computer integrated buidlings. In Innovation in Architecture, Engineering and Construction, 2005.Google ScholarGoogle Scholar
  24. K. Strehlke, M. Ochsendorf, and U. Bahr. Generative interfaces and scenarios for intelligent architecture - a framework for computer integrated buildings. In Generative Art Conference, 2004.Google ScholarGoogle Scholar
  25. S. Swinford. The Sunday Times - Asbo TV helps residents watch out. http://www.timesonline.co.uk/article/0,2087-1974974,00.html, January 08 2006.Google ScholarGoogle Scholar

Index Terms

  1. Privacy in video surveilled areas

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in
                    • Published in

                      cover image ACM Other conferences
                      PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
                      October 2006
                      389 pages
                      ISBN:1595936041
                      DOI:10.1145/1501434

                      Copyright © 2006 ACM

                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 30 October 2006

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • research-article

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader