Advertisement

Design and implementation of a secure and trustworthy platform for privacy-aware video surveillance

  • Antoni Martínez-Ballesté
  • Hatem Rashwan
  • Domenec Puig
  • Agusti Solanas
Regular Contribution
  • 233 Downloads

Abstract

Worldwide, thousands of video surveillance cameras record our daily activities. People are aware that video surveillance is deployed for the sake of security. However, the privacy of individuals would be endangered if the proper measures were not considered. Privacy-aware video surveillance has historically been addressed by proposals based on detecting individuals and other sensitive parts of the video and hiding them using a variety of techniques. In this paper, we present a comprehensive solution tackling video processing, video protection and management of the Information System. We claim that a video surveillance system can protect our safety and, at the same time, guarantee our privacy. We describe the design and implementation of a privacy-aware video surveillance platform that, in order to be trustworthy, accomplishes with the properties of high detection accuracy, real-time performance and protected video utility. We have tested the proposed platform, and we demonstrate the feasibility of our approach for privacy protection.

Keywords

Video surveillance Privacy Identity concealment Video processing 

Notes

Acknowledgements

This work was partly funded by the Spanish Government through Project CONSOLIDER INGENIO 2010 CSD2007-0004 ARES, Project TIN2011-27076-C03-01 CO-PRIVACY and by the Rovira i Virgili University through Project 2012R2B-01 VIPP.

References

  1. 1.
    Daniel, J., Solove, D.J.: I’ve got nothing to hide and other misunderstandings of privacy. San Diego Law Rev. 44, 745–757 (2007)Google Scholar
  2. 2.
    Mordini, E.: Nothing to hide biometrics, privacy and private sphere. In: BIOID 2008. LNCS, vol. 5372, pp. 247–257 (2008)Google Scholar
  3. 3.
    Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995. http://europa.eu/legislation_summaries/information_society/data_protection/l14012_en.htm
  4. 4.
    Senior, A. (ed.): Protecting Privacy in Video Surveillance. Springer, Berlin (2009)Google Scholar
  5. 5.
    Winkler, T., Rinner, B.: A systematic approach towards user-centric privacy and security for smart camera networks. In: Proceedings of the Fourth ACM/IEEE International Conference on Distributed Smart Cameras, pp. 133–141. ACM, New York (2010)Google Scholar
  6. 6.
    Rashwan, H.A., Martínez-Ballesté, A., Solanas, A., Puig, D.: Understanding trust in privacy-aware video surveillance systems. Int. J. Inf. Secur. 14(2), 225–234 (2015)Google Scholar
  7. 7.
    Kim, K., Chalidabhongse, T.H., Harwood, D., Davis, L.S.: Background modeling and subtraction by codebook construction. In: International Conference on Image Processing, vol. V, pp. 3061–3064 (2004)Google Scholar
  8. 8.
    Farnebäck, G.: Fast and accurate motion estimation using orientation tensors and parametric motion models. In: International Conference on Pattern Recognition, vol. I, pp. 135–139 (2000)Google Scholar
  9. 9.
    Winkler, T., Rinner, B.: TrustCAM: security and privacy-protection for an embedded smart camera based on trusted computing. In: Seventh IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 593–600 (2010)Google Scholar
  10. 10.
    Rashwan, H.A., Garcia, M.A., Puig, D.: Variational optical flow estimation based on stick tensor voting. IEEE Trans. Image Process. 22(7), 2589–2599 (2013)CrossRefGoogle Scholar
  11. 11.
    Dufaux, F., Navarro, A., Ebrahimi, T.: Privacy enabling technology for video surveillance. In: Proceeding of SPIE—The International Society for Optics and Photonics, vol. 6250, no. 1 (2006)Google Scholar
  12. 12.
    Dufaux, F., Ebrahimi, T.: Scrambling for privacy protection in video surveillance systems. IEEE Trans. Circuits Syst. Video Technol. 18(8), 1168–1174 (2008)CrossRefGoogle Scholar
  13. 13.
    Crises Research Group, Universitat Rovira i Virgili: The VIPP Project (Vigilància Informatitzada amb Protecció de la Privadesa, Privacy-Aware Computerised Video Surveillance). http://crises-deim.urv.cat/vipp/
  14. 14.
    INRIA Labs: CAVIAR test case scenarios. http://homepages.inf.ed.ac.uk/rbf/CAVIARDATA1/
  15. 15.
    Korshunov, P., Araimo, C., de Simone, F., Velardo, C., Dugelay, J., Ebrahimi, T.: Subjective study of privacy filters in video surveillance. In: 2012 IEEE 14th International Workshop on Multimedia Signal Processing (MMSP), pp. 378-382 (2012)Google Scholar
  16. 16.
    IETF: Updated security considerations for the MD5 message-digest and the HMAC-MD5 algorithms (RFC 6151). https://tools.ietf.org/html/rfc6151

Copyright information

© Springer-Verlag Berlin Heidelberg 2017

Authors and Affiliations

  • Antoni Martínez-Ballesté
    • 1
  • Hatem Rashwan
    • 1
  • Domenec Puig
    • 1
  • Agusti Solanas
    • 1
  1. 1.Dept. Enginyeria Informàtica i MatemàtiquesUniversitat Rovira i VirgiliTarragonaSpain

Personalised recommendations