[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/CVIIE.2005.16guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

PICO: Privacy through Invertible Cryptographic Obscuration

Published: 17 November 2005 Publication History

Abstract

Signifiicant research progress has been made in intelligent imaging systems, surveillance and biometrics improving robustness, increasing performance and decreasing cost. As a result, deployment of surveillance and intelligent video systems is booming and increasing the impact of these on privacy. For many, networked intelligent video systems, especially video surveillance and biometrics, epitomize the invasion of privacy by an Orwellian "big brother:. While tens of millions in government funding have been spent on research improving video surveillance, virtually none has been invested in technologies to enhance privacy or effectively balance privacy and security. This paper presents an example that demonstrates how using and adapting cryptographic ideas and combining them with intelligent video processing, technological pproaches can provide for solutions addressing these critical trade-offs, potentially improving both security and privacy. After reviewing previous research in privacy improving technology in video systems, the paper then presents cryptographically invertible obscuration. This is an application of encryption techniques to improve the privacy aspects while allowing general surveillance to continue and allowing full access (i.e. violation ofprivacy) only with use of a decryption key, maintained by a court or other thirdparty.

Cited By

View all
  • (2024)Visual Content Privacy Protection: A SurveyACM Computing Surveys10.1145/3708501Online publication date: 16-Dec-2024
  • (2023)Mosaic: Extremely Low-resolution RFID Vision for Visually-anonymized Action RecognitionProceedings of the 22nd International Conference on Information Processing in Sensor Networks10.1145/3583120.3586968(247-260)Online publication date: 9-May-2023
  • (2018)Applicability of No-Reference Visual Quality Indices for Visual Security AssessmentProceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security10.1145/3206004.3206007(139-144)Online publication date: 14-Jun-2018
  • Show More Cited By

Index Terms

  1. PICO: Privacy through Invertible Cryptographic Obscuration
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      CVIIE '05: Proceedings of the Computer Vision for Interactive and Intelligent Environment
      November 2005
      170 pages
      ISBN:0769525245

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 17 November 2005

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Visual Content Privacy Protection: A SurveyACM Computing Surveys10.1145/3708501Online publication date: 16-Dec-2024
      • (2023)Mosaic: Extremely Low-resolution RFID Vision for Visually-anonymized Action RecognitionProceedings of the 22nd International Conference on Information Processing in Sensor Networks10.1145/3583120.3586968(247-260)Online publication date: 9-May-2023
      • (2018)Applicability of No-Reference Visual Quality Indices for Visual Security AssessmentProceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security10.1145/3206004.3206007(139-144)Online publication date: 14-Jun-2018
      • (2018)Reversible data hiding based compressible privacy preserving system for color imageMultimedia Tools and Applications10.1007/s11042-017-5230-877:13(16597-16622)Online publication date: 1-Jul-2018
      • (2017)BibliographyFrontiers of Multimedia Research10.1145/3122865.3122878(315-377)Online publication date: 19-Dec-2017
      • (2017)Frontiers of Multimedia ResearchundefinedOnline publication date: 19-Dec-2017
      • (2016)De-identification for privacy protection in multimedia contentImage Communication10.1016/j.image.2016.05.02047:C(131-151)Online publication date: 1-Sep-2016
      • (2016)Understanding trust in privacy-aware video surveillance systemsInternational Journal of Information Security10.1007/s10207-015-0286-915:3(225-234)Online publication date: 1-Jun-2016
      • (2016)Building a post-compression region-of-interest encryption framework for existing video surveillance systemsMultimedia Systems10.1007/s00530-015-0473-622:5(617-639)Online publication date: 1-Oct-2016
      • (2015)Visual privacy protection methodsExpert Systems with Applications: An International Journal10.1016/j.eswa.2015.01.04142:9(4177-4195)Online publication date: 1-Jun-2015
      • Show More Cited By

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media