[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1655048.1655061acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Videosurveillance and privacy: covering the two sides of the mirror with DRM

Published: 09 November 2009 Publication History

Abstract

Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacrifice a part of their privacy by accepting to be surveilled by others. The tradeoff between both is usually reasonable and commonly accepted; however, the case of videosurveillance systems has been particularly controversial since their inception, as their benefits are not perceived to compensate for the privacy loss in many cases. The situation has become even worse during the last years with the massive deployment of these systems, which often do not provide satisfactory guarantees for the citizens. This paper proposes a DRM-based framework for videosurveillance to achieve a better balance between both concepts: it protects privacy of the surveilled individuals, whilst giving support to efficient automated surveillance.

References

[1]
The extensible rights markup language. http://www.xrml.org.
[2]
Oasis standards and other approved work.
[3]
P3P: The Platform for Privacy Preferences. http://www.w3.org/P3P/.
[4]
Directive 95/46/EC of the European Parliament and of the Council. Official Journal L 281, 23/11/1995 P. 0031 - 0050, October 1995.
[5]
Organic law 15/1999, on the protection of personal data, December 1999.
[6]
Privacy review: video surveillance programs in Peterborough. Information and Privacy Commissioner Office, Ontario, December 2004. Report.
[7]
Web Services Security Rights Expression Language (REL) Token Profile 1.1, February 2006. OASIS Standard.
[8]
Web services security: Soap message security 1.1 (ws-security 2004), February 2006. OASIS Standard.
[9]
Under the watchful eye: the proliferation of video surveillance systems in California. Americal Civil Liberties Union (ACLU), August 2007. Report.
[10]
ONVIF core specification ver 1.0, November 2008.
[11]
S. D. P. Agency. Instruction 1/2006, on processing personal data for surveillance purposes through camera or video-camera systems, November 2006.
[12]
A. Becker, A. Arnab, and M. Serra. Assessing privacy criteria for drm using eu privacy legislation. In Proceedings of the 8th ACM workshop on Digital Rights Management, pages 77--86, Alexandria, Virginia, USA, October 2008.
[13]
P. Carrillo, H. Kalva, and S. Magliveras. Compression independent object encryption for ensuring privacy in video surveillance. In IEEE International Conference on Multimedia and Expo, 2008.
[14]
A. Cavallaro. Privacy in video surveillance {in the spotlight}. IEEE Signal Processing Magazine, 24(2), March 2007.
[15]
A. Chattopadhyay and T. Boult. Privacycam: a privacy preserving camera using uCLinux on the Blackfin DSP. In IEEE Conference on computer vision and pattern recognition, CVPR'07, Minneapolis, MN, USA, 17-22 June 2007.
[16]
D. Chen, Y. Chang, R. Yan, and J. Yang. Tools for protecting the privacy of specific individuals in video. EURASIP Journal on Advances in Signal Processing, 2007:1--9, 2007.
[17]
N. Dalal and B. Triggs. Histograms of oriented gradients for human detection. volume 1, pages 886--893, Los Alamitos, CA, USA, 2005.
[18]
F. Dufaux, M. Ouaret, Y. Abdeljaoued, A. Navarro, F. Vergnen`egre, and T. Ebrahimi. Privacy enabling technology for video surveillance. In S. S. Agaian and S. A. Jassim, editors, Mobile Multimedia/Image Processing for Military and Security Applications, volume 6250. SPIE, 2006.
[19]
M. M. Fisch, H. St¨ogner, and A. Uhl. Layered encryption techniques for DCT-coded visual data. In European Signal Processing Conference on Signal Processing, EUSIPCO'04, 2004.
[20]
C. Fonteneau, J. Motscha, M. Babela, and O. D'eforges. A hierarchical selective encryption technique in a scalable image codec. In International Conference in Communications, Bucharest, Romania, 2008.
[21]
D. Gavrila and V. Philomin. Real-time object detection for 'smart' vehicles. In Seventh IEEE International Conference on Computer Vision, volume 1, pages 87--93, 1999.
[22]
H. Hofbauer, T. Stütz, and A. Uhl. Selective encryption for hierarchical MPEG. In S. B. Heidelberg, editor, Communications and Multimedia Security, volume 4237/2006 of Lecture Notes in Computer Science, pages 151--160, 2006.
[23]
S. Kenny and L. Korba. Applying digital rights management systems to privacy rights management. Journal of Computers and Security, November, 2002.
[24]
K. Martin and K. N. Plataniotis. Privacy protected surveillance using secure visual object coding. IEEE Transactions on Circuits and Systems for Video Technology, 18(8):1152--1162, 2008.
[25]
I. Martínez-Ponte, X. Desurmont, J. Meessen, and J.-F. cois Delaigle. Robust human face hiding ensuring privacy. In International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS'05, Montreux, Switzerland, April 2005.
[26]
M. McCahill. The Surveillance Web: The Rise of Visual Surveillance in an English City. Willan Publishing (UK), 2002.
[27]
M. McCahill and C. Norris. Cctv in London. Report deliverable of UrbanEye project, 2002.
[28]
Q. Meibing, C. Xiaorui, J. Jianguo, and Z. Shu. Face protection of h.264 video based on detecting and tracking. In 8th International Conference on Electronic Measurement and Instruments, ICEMI'07, volume 2, pages 172--177, 16-18 July 2007.
[29]
E. M. Newton, L. Sweeney, and B. Malin. Preserving privacy by de-identifying face images. IEEE Transactions on Knowledge and Data Engineering, 17(2):232--243, February 2005.
[30]
S.-W. Park and S.-U. Shin. Efficient selective encryption scheme for the H.264/Scalable Video Coding(SVC). In Fourth International Conference on Networked Computing and Advanced Information Management, volume 1, pages 371--376, Gyeongju, Korea, September 2-4 2008.
[31]
A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, and A. Ekin. Blinkering surveillance: enabling video privacy through computer vision. Technical report, IBM Research Division, August 2003.
[32]
S. Tansuriyavong and S. ichi Hanaki. Privacy protection by concealing persons in circumstantial video image. In ACM Workshop on Perceptive user interfaces, 2001.
[33]
N. Taylo. State surveillance and the right to privacy. Surveillance and Society, 1(1):66--85, 2002.
[34]
P. Viola and M. Jones. Rapid object detection using a boosted cascade of simple features. In IEEE Conference on Computer Vision and Pattern Recognition, volume 1, pages 511--518, 2001.
[35]
X. Wang, T. DeMartini, B. Bragg, M. Paravasivam, and C. Barlas. The MPEG-21 Rights Expression Language and Rights Data Dicitionary. IEEE Transactions on Multimedia, 7(3):408--417, June 2005.
[36]
D. J. Weitzner, H. Abelson, T. Berners-Lee, C. Hanson, J. A. Hendler, L. Kagal, D. L. McGuinness, G. J. Sussman, and K. K. Waterman. Transparent accountable data mining: New strategies for privacy protection. In AAAI Spring Symposium on The Semantic Web meets eGovernment, 2006.
[37]
A. Westin. Privacy and freedom. The Bodley Head Ltd., 1970.
[38]
X. Yu, K. Chinomi, T. Koshimizu, N. Nitta, Y. Ito, and N. Babaguchi. Privacy protecting visual processing for secure video surveillance. In IEEE International Conference on Image Processing, ICIP'08, pages 1672--1675, San Diego, CA, USA, 12-15 October 2008.

Cited By

View all
  • (2015)Drift-free video coding for privacy protected video scrambling2015 10th International Conference on Information, Communications and Signal Processing (ICICS)10.1109/ICICS.2015.7459830(1-5)Online publication date: Dec-2015
  • (2015)A context-aware mobile web middleware for service of surveillance video with privacyMultimedia Tools and Applications10.1007/s11042-014-2036-974:18(8025-8051)Online publication date: 1-Sep-2015
  • (2014)Security and Privacy Protection in Visual Sensor NetworksACM Computing Surveys10.1145/254588347:1(1-42)Online publication date: 1-May-2014
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
DRM '09: Proceedings of the nineth ACM workshop on Digital rights management
November 2009
104 pages
ISBN:9781605587790
DOI:10.1145/1655048
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 November 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. privacy
  3. rights management
  4. security
  5. videosurveillance

Qualifiers

  • Research-article

Conference

CCS '09
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2015)Drift-free video coding for privacy protected video scrambling2015 10th International Conference on Information, Communications and Signal Processing (ICICS)10.1109/ICICS.2015.7459830(1-5)Online publication date: Dec-2015
  • (2015)A context-aware mobile web middleware for service of surveillance video with privacyMultimedia Tools and Applications10.1007/s11042-014-2036-974:18(8025-8051)Online publication date: 1-Sep-2015
  • (2014)Security and Privacy Protection in Visual Sensor NetworksACM Computing Surveys10.1145/254588347:1(1-42)Online publication date: 1-May-2014
  • (2011)User-centric privacy awareness in video surveillanceMultimedia Systems10.1007/s00530-011-0241-118:2(99-121)Online publication date: 1-Jul-2011
  • (2010)Security for Video Surveillance with Privacy2010 International Conference on Internet Technology and Applications10.1109/ITAPP.2010.5566222(1-4)Online publication date: Aug-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media