Skip to main content

2013 | OriginalPaper | Buchkapitel

Privacy and Security in Video Surveillance

verfasst von : Thomas Winkler, Bernhard Rinner

Erschienen in: Intelligent Multimedia Surveillance

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Video surveillance systems are usually installed to increase the safety and security of people or property in the monitored areas. Typical threat scenarios are robbery, vandalism, shoplifting or terrorism. Other application scenarios are more intimate and private such as home monitoring or assisted living. For a long time, it was accepted that the potential benefits of video surveillance go hand in hand with a loss of personal privacy. However, with the on-board processing capabilities of modern embedded systems it becomes possible to compensate this privacy loss by making security and privacy protection inherent features of video surveillance cameras. In the first part of this chapter, we motivate the need for the integration of security and privacy features, we discuss fundamental requirements and provide a comprehensive review of the state of the art. The second part presents the TrustCAM prototype system where a dedicated hardware security module is integrated into a camera system to achieve a high level of security. The chapter is concluded by a summary of open research issues and an outlook to future trends.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
Literatur
1.
Zurück zum Zitat Albanesi, M.G., Ferretti, M., Guerrini, F.: A taxonomy for image authentication techniques and its application to the current state of the art. In: Proceedings of the International Conference on Image Analysis and Processing, pp. 535–540 (2001) CrossRef Albanesi, M.G., Ferretti, M., Guerrini, F.: A taxonomy for image authentication techniques and its application to the current state of the art. In: Proceedings of the International Conference on Image Analysis and Processing, pp. 535–540 (2001) CrossRef
2.
Zurück zum Zitat Atrey, P.K., Yan, W.-Q., Chang, E.-C., Kankanhalli, M.S.: A hierarchical signature scheme for robust video authentication using secret sharing. In: Proceedings of the International Conference on Multimedia Modelling, pp. 330–337 (2004) Atrey, P.K., Yan, W.-Q., Chang, E.-C., Kankanhalli, M.S.: A hierarchical signature scheme for robust video authentication using secret sharing. In: Proceedings of the International Conference on Multimedia Modelling, pp. 330–337 (2004)
3.
Zurück zum Zitat Atrey, P.K., Yan, W.-Q., Kankanhalli, M.S.: A scalable signature scheme for video authentication. Multimed. Tools Appl. 34(1), 107–135 (2006) CrossRef Atrey, P.K., Yan, W.-Q., Kankanhalli, M.S.: A scalable signature scheme for video authentication. Multimed. Tools Appl. 34(1), 107–135 (2006) CrossRef
4.
Zurück zum Zitat Baaziz, N., Lolo, N., Padilla, O., Petngang, F.: Security and privacy protection for automated video surveillance. In: Proceedings of the International Symposium on Signal Processing and Information Technology, pp. 17–22 (2007) Baaziz, N., Lolo, N., Padilla, O., Petngang, F.: Security and privacy protection for automated video surveillance. In: Proceedings of the International Symposium on Signal Processing and Information Technology, pp. 17–22 (2007)
5.
Zurück zum Zitat Bartolini, F., Tefas, A., Barni, M., Pitas, I.: Image authentication techniques for surveillance applications. Proc. IEEE 89(10), 1403–1418 (2001) CrossRef Bartolini, F., Tefas, A., Barni, M., Pitas, I.: Image authentication techniques for surveillance applications. Proc. IEEE 89(10), 1403–1418 (2001) CrossRef
6.
Zurück zum Zitat Boult, T.E.: PICO: privacy through invertible cryptographic obscuration. In: Proceedings of the Workshop on Computer Vision for Interactive and Intelligent Environments, pp. 27–38 (2005) CrossRef Boult, T.E.: PICO: privacy through invertible cryptographic obscuration. In: Proceedings of the Workshop on Computer Vision for Interactive and Intelligent Environments, pp. 27–38 (2005) CrossRef
7.
Zurück zum Zitat Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: Proceedings of the Conference on Computer Supported Cooperative Work, pp. 1–10 (2000) Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: Proceedings of the Conference on Computer Supported Cooperative Work, pp. 1–10 (2000)
8.
Zurück zum Zitat Bramberger, M., Brunner, J., Rinner, B., Schwabach, H.: Real-time video analysis on an embedded smart camera for traffic surveillance. In: IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 174–181 (2004) Bramberger, M., Brunner, J., Rinner, B., Schwabach, H.: Real-time video analysis on an embedded smart camera for traffic surveillance. In: IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 174–181 (2004)
9.
Zurück zum Zitat Brassil, J.: Using mobile communications to assert privacy from video surveillance. In: Proceedings of the Parallel and Distributed Processing Symposium, p. 8 (2005) Brassil, J.: Using mobile communications to assert privacy from video surveillance. In: Proceedings of the Parallel and Distributed Processing Symposium, p. 8 (2005)
11.
Zurück zum Zitat Cavallaro, A.: Adding privacy constraints to video-based applications. In: Proceedings of the European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology, p. 8 (2004) Cavallaro, A.: Adding privacy constraints to video-based applications. In: Proceedings of the European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology, p. 8 (2004)
13.
Zurück zum Zitat Challener, D., Yoder, K., Catherman, R., Safford, D., van Doorn, L.: A Practical Guide to Trusted Computing. IBM Press, Raleigh (2008) Challener, D., Yoder, K., Catherman, R., Safford, D., van Doorn, L.: A Practical Guide to Trusted Computing. IBM Press, Raleigh (2008)
14.
Zurück zum Zitat Chattopadhyay, A., Boult, T.E.: PrivacyCam: a privacy preserving camera using uClinux on the Blackfin DSP. In: Proceedings of the International Conference on Computer Vision and Pattern Recognition, pp. 1–8 (2007) Chattopadhyay, A., Boult, T.E.: PrivacyCam: a privacy preserving camera using uClinux on the Blackfin DSP. In: Proceedings of the International Conference on Computer Vision and Pattern Recognition, pp. 1–8 (2007)
15.
Zurück zum Zitat Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP J. Appl. Signal Process. 2007(1), 107–116 (2007) Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP J. Appl. Signal Process. 2007(1), 107–116 (2007)
16.
Zurück zum Zitat Cheung, S.-C.S., Zhao, J., Venkatesh, M.V.: Efficient object-based video inpainting. In: Proceedings of the International Conference on Image Processing, pp. 705–708 (2006) Cheung, S.-C.S., Zhao, J., Venkatesh, M.V.: Efficient object-based video inpainting. In: Proceedings of the International Conference on Image Processing, pp. 705–708 (2006)
17.
Zurück zum Zitat Cheung, S.-C.S., Paruchuri, J.K., Nguyen, T.P.: Managing privacy data in pervasive camera networks. In: Proceedings of the International Conference on Image Processing, pp. 1676–1679 (2008) Cheung, S.-C.S., Paruchuri, J.K., Nguyen, T.P.: Managing privacy data in pervasive camera networks. In: Proceedings of the International Conference on Image Processing, pp. 1676–1679 (2008)
18.
Zurück zum Zitat Chinomi, K., Nitta, N., Ito, Y., Babaguchi, N.: PriSurv: privacy protected video surveillance system using adaptive visual abstraction. In: Proceedings of the International Multimedia Modeling Conference, pp. 144–154 (2008) Chinomi, K., Nitta, N., Ito, Y., Babaguchi, N.: PriSurv: privacy protected video surveillance system using adaptive visual abstraction. In: Proceedings of the International Multimedia Modeling Conference, pp. 144–154 (2008)
19.
Zurück zum Zitat Davis, D.: Defective sign & encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML. In: Proceedings of the USENIX Technical Conference, pp. 65–78 (2001) Davis, D.: Defective sign & encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML. In: Proceedings of the USENIX Technical Conference, pp. 65–78 (2001)
20.
Zurück zum Zitat Dawson, D., Derby, P., Doyle, A., Fonio, C., Huey, L., Johanson, M., Leman-Langlois, S., Lippert, R., Lyon, D., Pratte, A.-M., Smith, E., Walby, K., Wilkinson, B.: A report on camera surveillance in Canada (part two): surveillance camera awareness network. Technical report, The Surveillance Project (2009) Dawson, D., Derby, P., Doyle, A., Fonio, C., Huey, L., Johanson, M., Leman-Langlois, S., Lippert, R., Lyon, D., Pratte, A.-M., Smith, E., Walby, K., Wilkinson, B.: A report on camera surveillance in Canada (part two): surveillance camera awareness network. Technical report, The Surveillance Project (2009)
21.
Zurück zum Zitat Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop, pp. 160–166 (2006) Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop, pp. 160–166 (2006)
22.
Zurück zum Zitat Dufaux, F., Ebrahimi, T.: A framework for the validation of privacy protection solutions in video surveillance. In: Proceedings of the International Conference on Multimedia and Expo, pp. 66–71 (2010) Dufaux, F., Ebrahimi, T.: A framework for the validation of privacy protection solutions in video surveillance. In: Proceedings of the International Conference on Multimedia and Expo, pp. 66–71 (2010)
23.
Zurück zum Zitat Farmer, D., Mann, C.C.: Surveillance nation (part I). Technol. Rev. 4, 34–43 (2003) Farmer, D., Mann, C.C.: Surveillance nation (part I). Technol. Rev. 4, 34–43 (2003)
24.
Zurück zum Zitat Fidaleo, D.A., Nguyen, H.-A., Trivedi, M.: The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In: Proceedings of the International Workshop on Video Surveillance and Sensor Networks, pp. 46–53 (2004) CrossRef Fidaleo, D.A., Nguyen, H.-A., Trivedi, M.: The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In: Proceedings of the International Workshop on Video Surveillance and Sensor Networks, pp. 46–53 (2004) CrossRef
25.
Zurück zum Zitat Fleck, S., Straßer, W.: Smart camera based monitoring system and its application to assisted living. Proc. IEEE 96(10), 1698–1714 (2008) CrossRef Fleck, S., Straßer, W.: Smart camera based monitoring system and its application to assisted living. Proc. IEEE 96(10), 1698–1714 (2008) CrossRef
26.
Zurück zum Zitat Fleck, S., Straßer, W.: Towards secure and privacy sensitive surveillance. In: Proceedings of the International Conference on Distributed Smart Cameras, p. 7 (2010) Fleck, S., Straßer, W.: Towards secure and privacy sensitive surveillance. In: Proceedings of the International Conference on Distributed Smart Cameras, p. 7 (2010)
27.
Zurück zum Zitat Friedman, G.L.: The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans. Consum. Electron. 39(4), 905–910 (1993) CrossRef Friedman, G.L.: The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans. Consum. Electron. 39(4), 905–910 (1993) CrossRef
28.
Zurück zum Zitat Gross, R., Sweeney, L., De Torre, F., Baker, S.: Model-based face de-identification. In: Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop, p. 8 (2006) Gross, R., Sweeney, L., De Torre, F., Baker, S.: Model-based face de-identification. In: Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop, p. 8 (2006)
29.
Zurück zum Zitat He, D., Sun, Q., Tian, Q.: A secure and robust object-based video authentication system. EURASIP J. Adv. Signal Process. 2004(14), 2185–2200 (2004) CrossRef He, D., Sun, Q., Tian, Q.: A secure and robust object-based video authentication system. EURASIP J. Adv. Signal Process. 2004(14), 2185–2200 (2004) CrossRef
30.
Zurück zum Zitat Helten, F., Fischer, B.: What do people think about CCTV? Findings from a Berlin survey. Technical report, Berlin Institute for Social Research (2004) Helten, F., Fischer, B.: What do people think about CCTV? Findings from a Berlin survey. Technical report, Berlin Institute for Social Research (2004)
32.
Zurück zum Zitat Li, G., Ito, Y., Yu, X., Nitta, N., Babaguchi, N.: Recoverable privacy protection for video content distribution. EURASIP J. Inf. Secur. 2009, 11 (2009) Li, G., Ito, Y., Yu, X., Nitta, N., Babaguchi, N.: Recoverable privacy protection for video content distribution. EURASIP J. Inf. Secur. 2009, 11 (2009)
33.
Zurück zum Zitat Luo, Y., Ye, S., Cheung, S.-C.S.: Anonymous subject identification in privacy-aware video surveillance. In: Proceedings of the International Conference on Multimedia and Expo, pp. 83–88 (2010) Luo, Y., Ye, S., Cheung, S.-C.S.: Anonymous subject identification in privacy-aware video surveillance. In: Proceedings of the International Conference on Multimedia and Expo, pp. 83–88 (2010)
34.
Zurück zum Zitat Martin, A.: The ten page introduction to trusted computing. Technical report RR-08-11, Oxford University Computing Laboratory (December 2008) Martin, A.: The ten page introduction to trusted computing. Technical report RR-08-11, Oxford University Computing Laboratory (December 2008)
35.
Zurück zum Zitat Martínez-Ponte, I., Desurmont, X., Meessen, J., Delaigle, J.-F.: Robust human face hiding ensuring privacy. In: Proceedings of the International Workshop on Image Analysis for Multimedia Interactive Services, p. 4 (2005) Martínez-Ponte, I., Desurmont, X., Meessen, J., Delaigle, J.-F.: Robust human face hiding ensuring privacy. In: Proceedings of the International Workshop on Image Analysis for Multimedia Interactive Services, p. 4 (2005)
36.
Zurück zum Zitat Memon, N., Wong P.W.: Protecting digital media content. Commun. ACM 41(7), 35–43 (1998) CrossRef Memon, N., Wong P.W.: Protecting digital media content. Commun. ACM 41(7), 35–43 (1998) CrossRef
37.
Zurück zum Zitat Mohanty, S.P.: A secure digital camera architecture for integrated real-time digital rights management. J. Syst. Archit. 55(10–12), 468–480 (2009) CrossRef Mohanty, S.P.: A secure digital camera architecture for integrated real-time digital rights management. J. Syst. Archit. 55(10–12), 468–480 (2009) CrossRef
38.
Zurück zum Zitat Moncrieff, S., Venkatesh, S., West, G.: Dynamic privacy in public surveillance. IEEE Comput. 42(9), 22–28 (2009) CrossRef Moncrieff, S., Venkatesh, S., West, G.: Dynamic privacy in public surveillance. IEEE Comput. 42(9), 22–28 (2009) CrossRef
39.
Zurück zum Zitat Ney, S., Pichler, K.: Video surveillance in Austria. Technical report, Interdisciplinary Centre for Comparative Research in the Social Sciences, Austria (2002) Ney, S., Pichler, K.: Video surveillance in Austria. Technical report, Interdisciplinary Centre for Comparative Research in the Social Sciences, Austria (2002)
40.
Zurück zum Zitat Norris, C.: A review of the increased use of CCTV and video-surveillance for crime prevention purposes in Europe. Technical report, Department of Sociological Studies, University of Sheffield, United Kingdom (2009) Norris, C.: A review of the increased use of CCTV and video-surveillance for crime prevention purposes in Europe. Technical report, Department of Sociological Studies, University of Sheffield, United Kingdom (2009)
41.
Zurück zum Zitat Pirker, M., Tögl, R., Hein, D., Danner, P.: A PrivacyCA for anonymity and trust. In: Proceedings of the International Conference on Trust and Trustworthy Computing, pp. 101–119 (2009) Pirker, M., Tögl, R., Hein, D., Danner, P.: A PrivacyCA for anonymity and trust. In: Proceedings of the International Conference on Trust and Trustworthy Computing, pp. 101–119 (2009)
42.
Zurück zum Zitat Qureshi, F.Z.: Object-video streams for preserving privacy in video surveillance. In: Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance, pp. 442–447 (2009) Qureshi, F.Z.: Object-video streams for preserving privacy in video surveillance. In: Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance, pp. 442–447 (2009)
43.
Zurück zum Zitat Qusquater, J.-J., Macq, B., Joye, M., Degand, N., Bernard, A.: Practical solution to authentication of images with a secure camera. Storage Retr. Image Video Databases 3022(1), 290–297 (1997) CrossRef Qusquater, J.-J., Macq, B., Joye, M., Degand, N., Bernard, A.: Practical solution to authentication of images with a secure camera. Storage Retr. Image Video Databases 3022(1), 290–297 (1997) CrossRef
44.
Zurück zum Zitat Rahman, S.M.M., Hossain, M.A., Mouftah, H., El Saddik, A., Okamoto, E.: A real-time privacy-sensitive data hiding approach based on chaos cryptography. In: Proceedings of the International Conference on Multimedia and Expo, pp. 72–77 (2010) Rahman, S.M.M., Hossain, M.A., Mouftah, H., El Saddik, A., Okamoto, E.: A real-time privacy-sensitive data hiding approach based on chaos cryptography. In: Proceedings of the International Conference on Multimedia and Expo, pp. 72–77 (2010)
45.
Zurück zum Zitat Saini, M., Atrey, P.K., Mehrotra, S., Emmanuel, S., Kankanhalli, M.S.: Privacy modeling for video data publication. In: Proceedings of the International Conference on Multimedia and Expo, pp. 60–65 (2010) Saini, M., Atrey, P.K., Mehrotra, S., Emmanuel, S., Kankanhalli, M.S.: Privacy modeling for video data publication. In: Proceedings of the International Conference on Multimedia and Expo, pp. 60–65 (2010)
46.
Zurück zum Zitat Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.S.: Anonymous surveillance. In: Proceedings of the International Workshop on Advances in Automated Multimedia Surveillance for Public Safety, p. 6 (2011) Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.S.: Anonymous surveillance. In: Proceedings of the International Workshop on Advances in Automated Multimedia Surveillance for Public Safety, p. 6 (2011)
47.
Zurück zum Zitat Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.S.: Hiding identity leakage channels for publication of surveillance video. In: Transactions on Data Hiding and Multimedia Security (2011) Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.S.: Hiding identity leakage channels for publication of surveillance video. In: Transactions on Data Hiding and Multimedia Security (2011)
48.
Zurück zum Zitat Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.S.: W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video. Springer Int. J. Multimed. Tools Appl. (August), 24 (2012) Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.S.: W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video. Springer Int. J. Multimed. Tools Appl. (August), 24 (2012)
49.
Zurück zum Zitat Schaffer, M., Schartner, P.: Video surveillance: a distributed approach to protect privacy. In: Proceedings of the International Conference on Communications and Multimedia Security, pp. 140–149 (2007) Schaffer, M., Schartner, P.: Video surveillance: a distributed approach to protect privacy. In: Proceedings of the International Conference on Communications and Multimedia Security, pp. 140–149 (2007)
50.
Zurück zum Zitat Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.Y.: Respectful cameras: selecting visual markers in real-time to address privacy concerns. In: Proceedings of the International Conference on Intelligent Robots and Systems, pp. 971–978 (2007) Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.Y.: Respectful cameras: selecting visual markers in real-time to address privacy concerns. In: Proceedings of the International Conference on Intelligent Robots and Systems, pp. 971–978 (2007)
51.
Zurück zum Zitat Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.-L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Secur. Priv. 3(3), 50–57 (2005) CrossRef Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.-L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Secur. Priv. 3(3), 50–57 (2005) CrossRef
52.
Zurück zum Zitat Serpanos, D.N., Papalambrou, A.: Security and privacy in distributed smart cameras. Proc. IEEE 96(10), 1678–1687 (2008) CrossRef Serpanos, D.N., Papalambrou, A.: Security and privacy in distributed smart cameras. Proc. IEEE 96(10), 1678–1687 (2008) CrossRef
53.
Zurück zum Zitat Spindler, T., Wartmann, C., Hovestadt, L., Roth, D., van Gool, L., Steffen, A.: Privacy in video surveilled areas. In: Proceedings of the International Conference on Privacy, Security and Trust, p. 10 (2006) Spindler, T., Wartmann, C., Hovestadt, L., Roth, D., van Gool, L., Steffen, A.: Privacy in video surveilled areas. In: Proceedings of the International Conference on Privacy, Security and Trust, p. 10 (2006)
54.
Zurück zum Zitat Tansuriyavong, S., Hanaki, S.: Privacy protection by concealing persons in circumstantial video image. In: Proceedings of the Workshop on Perceptive User Interfaces, p. 4 (2001) Tansuriyavong, S., Hanaki, S.: Privacy protection by concealing persons in circumstantial video image. In: Proceedings of the Workshop on Perceptive User Interfaces, p. 4 (2001)
56.
Zurück zum Zitat Troncoso-Pastoriza, J.R., Pérez-Freire, L., Pérez-González, F.: Videosurveillance and privacy: covering the two sides of the mirror with DRM. In: Proceedings of the Workshop on Digital Rights Management, pp. 83–94 (2009) Troncoso-Pastoriza, J.R., Pérez-Freire, L., Pérez-González, F.: Videosurveillance and privacy: covering the two sides of the mirror with DRM. In: Proceedings of the Workshop on Digital Rights Management, pp. 83–94 (2009)
59.
Zurück zum Zitat Vagts, H., Bauer, A.: Privacy-aware object representation for surveillance systems. In: Proceedings of the International Conference on Advanced Video and Signal Based Surveillance, pp. 601–608 (2010) Vagts, H., Bauer, A.: Privacy-aware object representation for surveillance systems. In: Proceedings of the International Conference on Advanced Video and Signal Based Surveillance, pp. 601–608 (2010)
60.
Zurück zum Zitat Vagts, H., Beyerer, J.: Security and privacy challenges in modern surveillance systems. In: Proceedings of the Future Security Research Conference, pp. 94–116 (2009) Vagts, H., Beyerer, J.: Security and privacy challenges in modern surveillance systems. In: Proceedings of the Future Security Research Conference, pp. 94–116 (2009)
61.
Zurück zum Zitat Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy protecting data collection in media spaces. In: Proceedings of the International Conference on Multimedia, pp. 48–55 (2004) Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy protecting data collection in media spaces. In: Proceedings of the International Conference on Multimedia, pp. 48–55 (2004)
62.
Zurück zum Zitat Williams, A., Ganesan, D., Hanson, A.: Aging in place: fall detection and localization in a distributed smart camera network. In: Proceedings of the International Conference on Multimedia, pp. 892–901 (2007) Williams, A., Ganesan, D., Hanson, A.: Aging in place: fall detection and localization in a distributed smart camera network. In: Proceedings of the International Conference on Multimedia, pp. 892–901 (2007)
63.
Zurück zum Zitat Winkler, T., Rinner, B.: A systematic approach towards user-centric privacy and security for smart camera networks. In: Proceedings of the International Conference on Distributed Smart Cameras, p. 8 (2010) Winkler, T., Rinner, B.: A systematic approach towards user-centric privacy and security for smart camera networks. In: Proceedings of the International Conference on Distributed Smart Cameras, p. 8 (2010)
64.
Zurück zum Zitat Winkler, T., Rinner, B.: TrustCAM: security and privacy-protection for an embedded smart camera based on trusted computing. In: Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance, pp. 593–600 (2010) Winkler, T., Rinner, B.: TrustCAM: security and privacy-protection for an embedded smart camera based on trusted computing. In: Proceedings of the International Conference on Advanced Video and Signal-Based Surveillance, pp. 593–600 (2010)
65.
Zurück zum Zitat Winkler, T., Rinner, B.: Securing embedded smart cameras with trusted computing. EURASIP J. Wirel. Commun. Netw. 2011, 20 (2011) CrossRef Winkler, T., Rinner, B.: Securing embedded smart cameras with trusted computing. EURASIP J. Wirel. Commun. Netw. 2011, 20 (2011) CrossRef
66.
Zurück zum Zitat Winkler, T., Rinner, B.: User centric privacy awareness in video surveillance. Multimed. Syst. 18(2), 99–121 (2012) CrossRef Winkler, T., Rinner, B.: User centric privacy awareness in video surveillance. Multimed. Syst. 18(2), 99–121 (2012) CrossRef
67.
Zurück zum Zitat Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE/ACM Trans. Netw. 7(4), 502–513 (1999) CrossRef Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE/ACM Trans. Netw. 7(4), 502–513 (1999) CrossRef
68.
Zurück zum Zitat Yabuta, K., Kitazawa, H., Tanaka, T.: A new concept of security camera monitoring with privacy protection by masking moving objects. In: Proceedings of the International Pacific-Rim Conference on Multimedia, pp. 831–842 (2005) Yabuta, K., Kitazawa, H., Tanaka, T.: A new concept of security camera monitoring with privacy protection by masking moving objects. In: Proceedings of the International Pacific-Rim Conference on Multimedia, pp. 831–842 (2005)
69.
Zurück zum Zitat Ye, S., Luo, Y., Zhao, J., Cheung, S.-C.S.: Anonymous biometric access control. EURASIP J. Inf. Secur. 2009, 18 (2009) Ye, S., Luo, Y., Zhao, J., Cheung, S.-C.S.: Anonymous biometric access control. EURASIP J. Inf. Secur. 2009, 18 (2009)
Metadaten
Titel
Privacy and Security in Video Surveillance
verfasst von
Thomas Winkler
Bernhard Rinner
Copyright-Jahr
2013
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-41512-8_3

Premium Partner