Preview

Scrambling for Privacy Protection in Video Surveillance Systems

Powerful Essays
Open Document
Open Document
4363 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Scrambling for Privacy Protection in Video Surveillance Systems
1168

Abstract—In this paper, we address the problem of privacy protection in video surveillance. We introduce two efficient approaches to conceal regions of interest (ROIs) based on transform-domain or codestream-domain scrambling. In the first technique, the sign of selected transform coefficients is pseudorandomly flipped during encoding. In the second method, some bits of the codestream are pseudorandomly inverted. We address more specifically the cases of MPEG-4 as it is today the prevailing standard in video surveillance equipment. Simulations show that both techniques successfully hide private data in ROIs while the scene remains comprehensible. Additionally, the amount of noise introduced by the scrambling process can be adjusted. Finally, the impact on coding efficiency performance is small, and the required computational complexity is negligible. Index Terms—Privacy, selective encryption, surveillance, video processing.

I. INTRODUCTION

V

IDEO surveillance systems are omnipresent nowadays, with large systems in use in strategic places such as public transportation, airports, city centers, or residential areas. The prevailing sense of insecurity at the beginning of this century, with terrorist threats and high criminality, renders the intensive use of video surveillance tolerable despite its Orwellian big brother nature. However, people have a legitimate fear of this invasion of their personal privacy, with this objection slowing down a wider acceptance of video surveillance systems. In this paper, we address the issue of privacy protection in video surveillance, with a goal to be able to conciliate the needs of video surveillance with the objection of privacy invasion. This issue has been previously addressed in [1]–[10]. In [1], the scene is represented using an object-based representation. Depending on the end-user access control authorizations, the system subsequently renders a modified version of the video where some objects are masked out. Hence,



References: [1] A. W. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, and A. Ekin, Blinkering Surveillance: Enabling Video Privacy Through Computer Vision 2003, IBM Tech. Rep. RC22886. [2] D. A. Fidaleo, H.-A. Nguyen, and M. Trivedi, “The networked sensor tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks,” in Proc. ACM 2nd Int. Workshop Video Surveillance Sensor Networks, New York, 2004, pp. 46–53. [3] E. Newton, L. Sweeney, and B. Malin, Preserving Privacy by De-Identifying Facial Images Carnegie Mellon Univ., 2003, Tech. Rep. CMU-CS-03-119. [4] T. E. Boult, “PICO: Privacy through Invertible Cryptographic Obscuration,” in Proc. IEEE/NSF Workshop Comput. Vis. Interactive Intell. Environ., Nov. 2005, pp. 27–38. [5] F. Dufaux and T. Ebrahimi, “Video Surveillance using JPEG 2000,” in SPIE Proc. Applications of Digital Image Processing XXVII, Denver, CO, Aug. 2004, pp. 268–275. [6] I. P. Martinez, X. Desurmont, J. Meessen, and J.-F. Delaigle, “Robust human face hiding ensuring privacy,” in Proc. Int. Workshop Image Anal. Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, Apr. 2005. [7] F. Dufaux and T. Ebrahimi, “Scrambling for video surveillance with privacy,” in Proc. IEEE Workshop on Privacy Research In Vision, New York, Jun. 2006, p. 160. [8] W. Zhang, S. S. Cheung, and M. Chen, “Hiding privacy information in video surveillance system,” in Proc. IEEE Int. Conf. Image Process., Genova, Italy, Sep. 2005, pp. II-868–II-871. [9] F. Dufaux and T. Ebrahimi, “Recent advances in MPEG-7 cameras,” in SPIE Proc. Applications of Digital Image Processing XXIX, San Diego, CA, Aug. 2006, vol. 6312, pp. 631211.1–631211.8. [10] [Online]. Available: http://www.eptascape.com/products/eptacam.htm [11] D. Taubman and M. Marcellin, JPEG 2000: Image Compression Fundamentals, Standards and Practice. Norwell, MA: Kluwer, 2002. [12] T. Ebrahimi and F. Pereira, The MPEG-4 Book. Englewood Cliffs, NJ: Prentice-Hall, 2002. [13] ISO/IEC 14496-7/DAM1 Optimized Reference Software for Coding of Audio-Visual Objects, , Mar. 2003, ISO/IEC JTC1/SC29/WG11 WG11N5550. (a) (b) Fig. 11. Privacy protection scrambling in a real video surveillance setting: (a) original sequence and (b) with transform-domain scrambling. real-time DSP implementation of background/foreground segmentation, MPEG-4 encoding and scrambling. The scrambling is using the transform-domain approach where 63 ac coefficients are pseudorandomly scrambled. Results are shown in Fig. 11. It can be observed that both pedestrians and moving cars are successfully scrambled. V. CONCLUSION In this paper, we have described a technique to address the issue of privacy in video surveillance. Regions of interest, assumed to correspond to privacy-sensitive data, are scrambled. In one approach, scrambling is applied in the transform-domain by pseudorandomly flipping the sign of transform ac coefficients or by pseudorandomly modifying dc coefficients. In a second approach, scrambling is performed directly on the compressed codestream by pseudorandomly inversing some bits corresponding to ac coefficients. Simulation results show that the proposed scrambling techniques are successful at concealing privacy-sensitive information while leaving the scene comprehensible. The protection depends on a secret encryption key and the process is fully reversible for authorized users, e.g., law-enforcement authorities, in possession of the latter. After scrambling, the resulting codestream is still standard compliant. Simulations results show that this is obtained with a negligible impact on coding efficiency and a small computational complexity. Moreover, the scrambling process is flexible and the amount of distortion introduced

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The purpose of this case study is to present the task of implementing a security video surveillance solution for DeVry University. DeVry University requests a high-definition security system that has the following features:…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Privacy is the state of being free from intrusion in one’s personal life, or so it used to be. In Simson Garfinkel’s article “Privacy Under Attack” he discusses how technology has invaded people’s privacies over the years and continues to do so. From telephone systems and mail to car computers and surveillance cameras.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In 1992, Dallmeier presented the world’s first video sensor with digital image storage. At this time, the idea of using digital image storage in video surveillance wasn’t taken seriously but Dallmeier saw its benefits and potential. In retrospect, this idea has proved to be a groundbreaking development, one that has revolutionized video surveillance. Today we cannot imagine the security field without the use of digital technology.Panomera® is a completely novel camera technology, which was specially developed for the all-encompassing video surveillance of expansive areas. With Panomera®, huge widths, as well as areas with large distances can be displayed with a completely new resolution quality, in real time and at high frame rates of up to 30 fps.While other video analysis systems are limited to pure motion detection, Dallmeier uses SEDOR® – an abbreviation for “Self Learning Event Detector” – a self-learning analysis system. Using intelligent picture analysis algorithms and self-learning detection systems a variety of different situations can be automatically recognised even in complex scenes. For example, object sizes, directions of movement and speeds can be analysed. Environmental influences like rain, snow or branches blowing in the wind are filtered out using special algorithms.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Recently “webcam hacking” has become a major concern in our modern world. Similar to the telecsreens found in 1984, webcams have the capability of constantly monitoring computer users. According to The Guardian, “Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing.” It is evident that our technology has the capability to surveil computer users at any moment.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Good Essays

    David Ropeik writes in his article entitled ‘Big Brother IS Watching, and I Feel Fine.’ about the the influx of surveillance cameras throughout public and private areas. There has been debate on whether or not there should be so many surveillance cameras or if there should even be more. Studies show that even though surveillance can invade privacy, they help lower the rate of crime or find the suspects after the crime is committed.…

    • 414 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Security is not the same as it was 20 years ago. As they advance and become used more frequently, people begin to have different perspectives on them. In her article “Trading Liberty for Illusions”, published in Free Inquiry, Wendy Kaminer discusses to the American citizens how their privacy and freedom has been invaded through the use of surveillance systems. In contrast, the article “If Looks Could Kill”, written by The Economist group asserts that monitoring actions can be a difficult and tedious work as a human, but at the same time advanced surveillance cameras have not been accurate. Both authors emphasize their ideas using the help of specific strategies.…

    • 892 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Everyone leaves personal digital tracks in systems whenever he or she make a purchase, takes a trip, uses a bank account, make a phone call, walks past a security camera, obtains a prescription, send or receives a package, files income tax forms, applies for a loan, e-mails a friend, sends a fax, rent a video, or engages in just about any other activity. The security camera increases the scope and nature of available data. Law-abiding citizens, criminal and terrorist leave extensive digital tracks. Gathering and analyzing electronic and behavioral information can play major roles in detecting and preventing terrorist…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Freund, K. (2015). When Cameras Are Rolling: Privacy Implications of Body-Mounted Cameras on Police. Columbia Journal Of Law…

    • 515 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The concept of living in a surveillance society with no fear as long as individuals have nothing to hide sounds ideal; but even if people are not guilty of committing a crime, there are a number of reasons why loss of privacy should concern them. A significant concern is that the…

    • 1755 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Surveillance Cameras

    • 567 Words
    • 3 Pages

    Nadine Strossen is the authors of “Everyone is watching you” an article that its main purpose is to alert readers how our privacy rights are been violated by surveillance cameras. The article in general informs the reader of the topic right from the beginning with the title which explains a lot of the matter to discuss. The author introduces the topic very clear with the example of Eric Blair the author of “Big Brother is watching you” and how this caption relates to the matter. I have two reasons to believe that this article will not captive’s people’s attention. First, it does not give a lot of examples on the matter base on what the majority of the citizens live style is. Second yes, the article puts the problem out there but it gives no clear solution on how to fix it.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Dystopian Novel

    • 1604 Words
    • 7 Pages

    Cited: Akers, Becky. “Whole-Body Imaging: Intrusion Without Security.” Freeman Vol. 60, No. 4 May 2010: n. pag. SIRS Issues Researcher. Web. 5 Dec. 2011. .…

    • 1604 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    One procedure that will have an enormous cost is when the video is requested. Tennessee, for example has one of the most liberal requests for information in the union. If redaction is necessary for video files, that process is time consuming and expensive. Also, there will be a privacy case at some point in the next several years as these cameras become more prevalent in law enforcement. I…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The problem with continuous recording raises many privacy issues, for the public as well as for officers. For example, crime victims (especially victims of rape, abuse, and other sensitive crimes), as well as witnesses who are concerned about…

    • 1325 Words
    • 4 Pages
    Better Essays
  • Good Essays

    According to Cornell University, “ The researchers found that video surveillance systems were most effective in parking lots. Across the studies included in the analysis, CCTV resulted in a 51 percent decrease in crimes committed in parking lots. CCTV resulted in a 23 percent decrease in crime on public transportation.” This quote shows that security cameras cause criminals to think about their actions consequences before committing a crime. Which would never occur without the aid of the closed circuit television cameras, also known as CCTV. While a concern for privacy is a great factor when it comes to surveillance, majority of the citizens feel as the well being of those around them are far more important. Some falsely believe that CCTV cameras only infringe on society's privacy and has no effect when it comes to preventing possible crimes from occurring; yet, according to Urban Institutes, “ Our evaluation of three cities found that the most effective systems are monitored by trained staff, have enough cameras to detect crimes in progress, and integrate the technology into all manner of law enforcement activities.” This quote describes that it has been proven that using the CCTV cameras help discern criminals from the rest of the citizens. When they are monitored by trained staff, the use of the technology can allow police to find out exactly when…

    • 957 Words
    • 4 Pages
    Good Essays

Related Topics