Skip to main content

2016 | OriginalPaper | Buchkapitel

A Formal Treatment of Privacy in Video Data

verfasst von : Valerie Fetzer, Jörn Müller-Quade, Tobias Nilges

Erschienen in: Computer Security – ESORICS 2016

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Video surveillance has become prevalent both in public spaces, e.g. to prevent crimes, and in private areas, e.g. in order to assist the staff in assisted living communities. This leads to privacy concerns regarding the ability of third parties to create profiles and track individuals, possibly across several services.
Usually, techniques such as pixelation and silhouettes are used to anonymize individuals. However, no formal treatment of privacy for video data has been proposed and current anonymization techniques are simply “best practice”. To resolve this unsatisfactory state of affairs, we initiate a formal treatment of privacy in video data and propose a game-based notion for privacy in video data that is inspired by cryptographic security games.
We show for an exemplary video privacy scheme that this scheme satisfies our notion with good parameters. In order to evaluate these parameters, we conduct a user study where the users essentially play the role of the adversary in the privacy game. Our approach can be used as a blueprint to evaluate the privacy of other video privacy schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
We focus on hiding information about individuals in video data. This does not directly translate into anonymity. Instead, it limits the number of features that are available to identify individuals, which in turn can lead to (some form of) anonymity, depending on the scenario.
 
2
Please note that we only had a limited dataset available. In real scenarios, the operators of surveillance systems should be able to obtain a larger dataset and more representative results.
 
3
One might argue that it is very difficult to explicitly state all features that are not hidden, but we show in Sect. 4.4 that a good approximation seems to be sufficient in most cases.
 
4
Our discussion in Sect. 4.5 elaborates on the problems that arise when cutting the videos.
 
Literatur
1.
Zurück zum Zitat Abowd, G.D., Bobick, A.F., Essa, I.A., Mynatt, E.D., Rogers, W.A.: The aware home: a living laboratory for technologies for successful aging. In: Proceedings of AAAI Workshop and Automation as a Care Giver, pp. 1–7 (2002) Abowd, G.D., Bobick, A.F., Essa, I.A., Mynatt, E.D., Rogers, W.A.: The aware home: a living laboratory for technologies for successful aging. In: Proceedings of AAAI Workshop and Automation as a Care Giver, pp. 1–7 (2002)
2.
Zurück zum Zitat Bamba, B., Liu, L.: Privacygrid: supporting anonymous location queries in mobile environments. Technical report, Defense Technical Information Center (2007) Bamba, B., Liu, L.: Privacygrid: supporting anonymous location queries in mobile environments. Technical report, Defense Technical Information Center (2007)
3.
Zurück zum Zitat Berger, A.M.: Privacy mode for acquisition cameras and camcorders. US Patent 6,067,399 (2000) Berger, A.M.: Privacy mode for acquisition cameras and camcorders. US Patent 6,067,399 (2000)
4.
Zurück zum Zitat Birnstill, P., Ren, D., Beyerer, J.: A user study on anonymization techniques for smart video surveillance. In: 2015 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1–6. IEEE (2015) Birnstill, P., Ren, D., Beyerer, J.: A user study on anonymization techniques for smart video surveillance. In: 2015 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1–6. IEEE (2015)
5.
Zurück zum Zitat Cavallaro, A.: Adding privacy constraints to video-based applications. In: European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology (2004) Cavallaro, A.: Adding privacy constraints to video-based applications. In: European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology (2004)
6.
Zurück zum Zitat Charfi, I., Miteran, J., Dubois, J., Atri, M., Tourki, R.: Definition and performance evaluation of a robust SVM based fall detection solution. In: Eighth International Conference on Signal Image Technology and Internet Based Systems (SITIS), pp. 218–224. IEEE (2012) Charfi, I., Miteran, J., Dubois, J., Atri, M., Tourki, R.: Definition and performance evaluation of a robust SVM based fall detection solution. In: Eighth International Conference on Signal Image Technology and Internet Based Systems (SITIS), pp. 218–224. IEEE (2012)
7.
Zurück zum Zitat Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP J. Adv. Sig. Process. 2007(1), 075427 (2007)CrossRefMATH Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP J. Adv. Sig. Process. 2007(1), 075427 (2007)CrossRefMATH
8.
Zurück zum Zitat Chen, D., Chang, Y., Yan, R., Yang, J.: Protecting personal identification in video. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 115–128. Springer, London (2009)CrossRef Chen, D., Chang, Y., Yan, R., Yang, J.: Protecting personal identification in video. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 115–128. Springer, London (2009)CrossRef
9.
Zurück zum Zitat Chinomi, K., Nitta, N., Ito, Y., Babaguchi, N.: Prisurv: privacy protected video surveillance system using adaptive visual abstraction. In: Satoh, S., Nack, F., Etoh, M. (eds.) MMM 2008. LNCS, vol. 4903, pp. 144–154. Springer, Heidelberg (2008)CrossRef Chinomi, K., Nitta, N., Ito, Y., Babaguchi, N.: Prisurv: privacy protected video surveillance system using adaptive visual abstraction. In: Satoh, S., Nack, F., Etoh, M. (eds.) MMM 2008. LNCS, vol. 4903, pp. 144–154. Springer, Heidelberg (2008)CrossRef
10.
Zurück zum Zitat Cichowski, J., Czyzewski, A.: Reversible video stream anonymization for video surveillance systems based on pixels relocation and watermarking. In: IEEE International Conference on Computer Vision Workshops (ICCV Workshops), pp. 1971–1977 (2011) Cichowski, J., Czyzewski, A.: Reversible video stream anonymization for video surveillance systems based on pixels relocation and watermarking. In: IEEE International Conference on Computer Vision Workshops (ICCV Workshops), pp. 1971–1977 (2011)
11.
Zurück zum Zitat Clopper, C.J., Pearson, E.S.: The use of confidence or fiducial limits illustrated in the case of the binomial. Biometrika 26(4), 404–413 (1934)CrossRefMATH Clopper, C.J., Pearson, E.S.: The use of confidence or fiducial limits illustrated in the case of the binomial. Biometrika 26(4), 404–413 (1934)CrossRefMATH
12.
Zurück zum Zitat Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)CrossRef Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)CrossRef
13.
Zurück zum Zitat Fleck, S., Straßer, W.: Smart camera based monitoring system and its application to assisted living. Proc. IEEE 96(10), 1698–1714 (2008)CrossRef Fleck, S., Straßer, W.: Smart camera based monitoring system and its application to assisted living. Proc. IEEE 96(10), 1698–1714 (2008)CrossRef
15.
Zurück zum Zitat Gorelick, L., Blank, M., Shechtman, E., Irani, M., Basri, R.: Actions as space-time shapes. Trans. Pattern Anal. Mach. Intell. 29(12), 2247–2253 (2007)CrossRef Gorelick, L., Blank, M., Shechtman, E., Irani, M., Basri, R.: Actions as space-time shapes. Trans. Pattern Anal. Mach. Intell. 29(12), 2247–2253 (2007)CrossRef
16.
Zurück zum Zitat Haering, N., Venetianer, P.L., Lipton, A.: The evolution of video surveillance: an overview. Mach. Vis. Appl. 19(5–6), 279–290 (2008)CrossRef Haering, N., Venetianer, P.L., Lipton, A.: The evolution of video surveillance: an overview. Mach. Vis. Appl. 19(5–6), 279–290 (2008)CrossRef
17.
Zurück zum Zitat Hampapur, A., Brown, L., Connell, J., Ekin, A., Haas, N., Lu, M., Pankanti, S.: Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Sig. Process. Mag. 22(2), 38–51 (2005)CrossRef Hampapur, A., Brown, L., Connell, J., Ekin, A., Haas, N., Lu, M., Pankanti, S.: Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Sig. Process. Mag. 22(2), 38–51 (2005)CrossRef
18.
Zurück zum Zitat Huber, M., Müller-Quade, J., Nilges, T., Thal, C.: A provably privacy preserving video surveillance architecture for an assisted living community. In: GI-Jahrestagung, pp. 563–574 (2014) Huber, M., Müller-Quade, J., Nilges, T., Thal, C.: A provably privacy preserving video surveillance architecture for an assisted living community. In: GI-Jahrestagung, pp. 563–574 (2014)
19.
Zurück zum Zitat Kifer, D., Gehrke, J.: L-diversity: privacy beyond k-anonymity. In: ICDE, p. 24 (2006) Kifer, D., Gehrke, J.: L-diversity: privacy beyond k-anonymity. In: ICDE, p. 24 (2006)
20.
Zurück zum Zitat Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, SIGMOD 2011, pp. 193–204. ACM, New York (2011) Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, SIGMOD 2011, pp. 193–204. ACM, New York (2011)
21.
Zurück zum Zitat Kifer, D., Machanavajjhala, A.: Pufferfish: a framework for mathematical privacy definitions. ACM Trans. Database Syst. 39(1), 3:1–3:36 (2014)MathSciNetCrossRefMATH Kifer, D., Machanavajjhala, A.: Pufferfish: a framework for mathematical privacy definitions. ACM Trans. Database Syst. 39(1), 3:1–3:36 (2014)MathSciNetCrossRefMATH
22.
Zurück zum Zitat Kleinberger, T., Becker, M., Ras, E., Holzinger, A., Müller, P.: Ambient intelligence in assisted living: enable elderly people to handle future interfaces. In: Stephanidis, C. (ed.) UAHCI 2007 (Part II). LNCS, vol. 4555, pp. 103–112. Springer, Heidelberg (2007)CrossRef Kleinberger, T., Becker, M., Ras, E., Holzinger, A., Müller, P.: Ambient intelligence in assisted living: enable elderly people to handle future interfaces. In: Stephanidis, C. (ed.) UAHCI 2007 (Part II). LNCS, vol. 4555, pp. 103–112. Springer, Heidelberg (2007)CrossRef
23.
Zurück zum Zitat Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: ICDE, pp. 106–115 (2007) Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: ICDE, pp. 106–115 (2007)
24.
Zurück zum Zitat Neustaedter, C., Greenberg, S., Boyle, M.: Blur filtration fails to preserve privacy for home-based video conferencing. ACM Trans. Comput. Hum. Interact. (TOCHI) 13(1), 1–36 (2006)CrossRef Neustaedter, C., Greenberg, S., Boyle, M.: Blur filtration fails to preserve privacy for home-based video conferencing. ACM Trans. Comput. Hum. Interact. (TOCHI) 13(1), 1–36 (2006)CrossRef
25.
Zurück zum Zitat Norris, C., McCahill, M., Wood, D.: The growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space. Surveill. Soc. 2(2/3), 110–135 (2002) Norris, C., McCahill, M., Wood, D.: The growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space. Surveill. Soc. 2(2/3), 110–135 (2002)
26.
Zurück zum Zitat Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Secur. Priv. 3(3), 50–57 (2005)CrossRef Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Secur. Priv. 3(3), 50–57 (2005)CrossRef
27.
Zurück zum Zitat Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefMATH Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefMATH
28.
Zurück zum Zitat Thorpe, C., Li, F., Li, Z., Yu, Z., Saunders, D., Yu, J.: A coprime blur scheme for data security in video surveillance. IEEE Trans. Pattern Anal. Mach. Intell. 35(12), 3066–3072 (2013)CrossRef Thorpe, C., Li, F., Li, Z., Yu, Z., Saunders, D., Yu, J.: A coprime blur scheme for data security in video surveillance. IEEE Trans. Pattern Anal. Mach. Intell. 35(12), 3066–3072 (2013)CrossRef
29.
Zurück zum Zitat Valera, M., Velastin, S.A.: Intelligent distributed surveillance systems: a review. In: IEEE Proceedings - Vision, Image and Signal Processing, vol. 152, pp. 192–204. IET (2005) Valera, M., Velastin, S.A.: Intelligent distributed surveillance systems: a review. In: IEEE Proceedings - Vision, Image and Signal Processing, vol. 152, pp. 192–204. IET (2005)
30.
31.
Zurück zum Zitat Welsh, B.C., Farrington, D.P.: Evidence-based crime prevention: the effectiveness of CCTV. Crime Prev. Community Saf. 6(2), 21–33 (2004)CrossRef Welsh, B.C., Farrington, D.P.: Evidence-based crime prevention: the effectiveness of CCTV. Crime Prev. Community Saf. 6(2), 21–33 (2004)CrossRef
32.
Zurück zum Zitat Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy protecting data collection in media spaces. In: Proceedings of the 12th Annual ACM International Conference on Multimedia, pp. 48–55. ACM (2004) Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy protecting data collection in media spaces. In: Proceedings of the 12th Annual ACM International Conference on Multimedia, pp. 48–55. ACM (2004)
33.
Zurück zum Zitat Winkler, T., Rinner, B.: Privacy and security in video surveillance. In: Atrey, P.K., Kankanhalli, M.S., Cavallaro, A. (eds.) Intelligent Multimedia Surveillance, pp. 37–66. Springer, Heidelberg (2013)CrossRef Winkler, T., Rinner, B.: Privacy and security in video surveillance. In: Atrey, P.K., Kankanhalli, M.S., Cavallaro, A. (eds.) Intelligent Multimedia Surveillance, pp. 37–66. Springer, Heidelberg (2013)CrossRef
34.
Zurück zum Zitat Winkler, T., Rinner, B.: Security and privacy protection in visual sensor networks: a survey. ACM Comput. Surv. (CSUR) 47(1), 2 (2014)CrossRef Winkler, T., Rinner, B.: Security and privacy protection in visual sensor networks: a survey. ACM Comput. Surv. (CSUR) 47(1), 2 (2014)CrossRef
35.
Zurück zum Zitat Wood, A.D., Stankovic, J.A., Virone, G., Selavo, L., He, Z., Cao, Q., Doan, T., Wu, Y., Fang, L., Stoleru, R.: Context-aware wireless sensor networks for assisted living and residential monitoring. IEEE Netw. 22(4), 26–33 (2008)CrossRef Wood, A.D., Stankovic, J.A., Virone, G., Selavo, L., He, Z., Cao, Q., Doan, T., Wu, Y., Fang, L., Stoleru, R.: Context-aware wireless sensor networks for assisted living and residential monitoring. IEEE Netw. 22(4), 26–33 (2008)CrossRef
Metadaten
Titel
A Formal Treatment of Privacy in Video Data
verfasst von
Valerie Fetzer
Jörn Müller-Quade
Tobias Nilges
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-45741-3_21

Premium Partner