Adding Privacy Constraints to Video-Based Applications
نویسنده
چکیده
Remote accessibility to video cameras, face recognition software, and searchable image and video databases enable automated video surveillance. The same technologies and features enabling advanced functionalities facilitate as well the misuse of a surveillance system and can lead to the infringement of the privacy of an individual. Examples of misuse are voyeurism and the unauthorized collection of data on activities or behaviours of an individual. To overcome this problem, we propose a system architecture for privacypreserving video-based applications which uses image and video segmentation. Image and video segmentation are inherently ill-posed problems. In this sense, no unique segmentation of a scene exists: a priori knowledge about the nature of the problem is required in most situations. To this end, we propose a segmentation framework that embeds such a priori knowledge in the form of privacy constraints. The proposed framework is composed of two levels of semantic segmentation and subsequent description. The first level extracts video objects whereas the second extracts parts of a scene that can identify an individual, such as faces and license plates. The rationale behind this framework is that the data that one needs to hide for preserving the privacy of individuals and the data one needs to process to understand a scene may be divided into two non-overlapping sets. These two sets can be stored and processed separately thus enabling the use of automated surveillance in public places while protecting privacy.
منابع مشابه
Privacy-Respecting Smart Video Surveillance Based on Usage Control Enforcement
The number of video surveillance deployments in publicly accessible spaces is continuously increasing. At the same time, the call for technical assistance of human operators in terms of so-called smart video surveillance system has been growing ever louder and is addressed by research and development. With such systems, video analysis algorithms for activity recognition, tracking, and biometric...
متن کاملCompression Independent Reversible Encryption for Privacy in Video Surveillance
One of the main concerns of the wide use of video surveillance is the loss of individual privacy. Individuals who are not suspects need not be identified on camera recordings. Mechanisms that protect the identity while ensuring legitimate security needs are necessary. Selectively encrypting regions that reveal identity (e.g., faces or vehicle tags) are necessary to preserve individuals’ right t...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملالگوریتم کنترل نرخ بیت متغیر ویدئو در سطح گروه تصاویر برای استاندارد فشردهسازی H.265
A rate control algorithm at the group of picture (GOP) level is proposed in this paper for variable bit rate applications of the H.265/HEVC video coding standard with buffer constraint. Due to structural changes in the HEVC compared to the previous standards, new rate control algorithms are needed to be designed. In the proposed algorithm, quantization parameter (QP) of each GOP is obtained by ...
متن کاملTraceability improvements of a new RFID protocol based on EPC C1 G2
Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...
متن کامل