TrustEYE.M4: Protecting the sensor - Not the camera
نویسندگان
چکیده
Images captured in camera networks are potentially privacy sensitive and therefore need protection. A critical aspect is where protection is applied – after transmission at the data center or preferably already on the camera. In this work we take on-camera protection a step further and propose to make privacy protection and security inherent features of the image sensing unit. Already within the camera we realize strong separation between components that have access to raw image data and those that do not need raw data access. Our approach is based on the custom-designed TrustEYE.M4 prototype of a secure sensing unit. We demonstrate the feasibility of sensor-level privacy protection with a cartoon-like effect based on mean shift filtering. 1. Motivation and Approach In home monitoring and assisted living applications cameras are deployed in private environments where captured data is highly privacy sensitive. This is addressed by integrating privacy protection techniques [2, 8], combined with IT-security features [3, 16, 19], directly into cameras. With our TrustEYE.M4 prototype [18] we contribute to the state of the art by moving privacy protection and security into the image sensing unit. We demonstrate the feasibility of this approach by applying real-time privacy protection via a cartoon-like effect at the sensor level. Furthermore, we advance the state of the art by addressing the following two major limitations of existing secure camera solutions: Implicitly trusted software components. Large software components of a camera such as the operating system, the network stack and system libraries are part of the implicitly trusted software base. Even with, e.g., secure boot which ensures that only genuine software is executed, it is impossible to guarantee the absence of, yet undisclosed, security flaws which can be exploited by attackers. It is therefore a ’best practice’ to reduce the amount trusted components as much as possible. Lack of separation. On-camera privacy protection and security measures are performed typically at the application level as part of the computer vision tasks. Consequentially, security and privacy protection are tightly interwoven with the application logic and they are left in the responsibility of application developers. Secure Sensing Unit Camera Host System
منابع مشابه
GPS Jamming Detection in UAV Navigation Using Visual Odometry and HOD Trajectory Descriptor
Auto-navigating of unmanned aerial vehicles (UAV) in the outdoor environment is performed by using the Global positioning system (GPS) receiver. The power of the GPS signal on the earth surface is very low. This can affect the performance of GPS receivers in the environments contaminated with the other source of radio frequency interference (RFI). GPS jamming and spoofing are the most serious a...
متن کاملAppropriate energy window width for gamma camera [Persian]
Introduction: Scatter radiation is one of the major sources of error in nuclear medicine data processing. Different methods of scatter correction have been introduced in order to improve the quality of data. However the best method is to avoid recording of scatter photons in acquisition. The only difference between scattered and non-scattered photons is the energy. Pulse height analyzer i...
متن کاملFeasibility of portable gamma camera imaging in intraoperative radioguided parathyroid adenoma identification
Novel surgical applications include radioguided procedures in parathyroidectomy operations. In order to investigate the feasibility of usage of the portable gamma camera in parathyroidectomy operations; intraoperative radioguided parathyroidectomy operation was performed in three hyperparathyroidism patients with inconclusive preoperative parathyroid scintigraphy results. Intraoperative portabl...
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملA multi-hop PSO based localization algorithm for wireless sensor networks
A sensor network consists of a large number of sensor nodes that are distributed in a large geographic environment to collect data. Localization is one of the key issues in wireless sensor network researches because it is important to determine the location of an event. On the other side, finding the location of a wireless sensor node by the Global Positioning System (GPS) is not appropriate du...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014