Preview

Scrambling for Privacy Protection in Video Surveillance Systems

Powerful Essays
Open Document
Open Document
4363 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Scrambling for Privacy Protection in Video Surveillance Systems
1168

Abstract—In this paper, we address the problem of privacy protection in video surveillance. We introduce two efficient approaches to conceal regions of interest (ROIs) based on transform-domain or codestream-domain scrambling. In the first technique, the sign of selected transform coefficients is pseudorandomly flipped during encoding. In the second method, some bits of the codestream are pseudorandomly inverted. We address more specifically the cases of MPEG-4 as it is today the prevailing standard in video surveillance equipment. Simulations show that both techniques successfully hide private data in ROIs while the scene remains comprehensible. Additionally, the amount of noise introduced by the scrambling process can be adjusted. Finally, the impact on coding efficiency performance is small, and the required computational complexity is negligible. Index Terms—Privacy, selective encryption, surveillance, video processing.

I. INTRODUCTION

V

IDEO surveillance systems are omnipresent nowadays, with large systems in use in strategic places such as public transportation, airports, city centers, or residential areas. The prevailing sense of insecurity at the beginning of this century, with terrorist threats and high criminality, renders the intensive use of video surveillance tolerable despite its Orwellian big brother nature. However, people have a legitimate fear of this invasion of their personal privacy, with this objection slowing down a wider acceptance of video surveillance systems. In this paper, we address the issue of privacy protection in video surveillance, with a goal to be able to conciliate the needs of video surveillance with the objection of privacy invasion. This issue has been previously addressed in [1]–[10]. In [1], the scene is represented using an object-based representation. Depending on the end-user access control authorizations, the system subsequently renders a modified version of the video where some objects are masked out. Hence,



References: [1] A. W. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, and A. Ekin, Blinkering Surveillance: Enabling Video Privacy Through Computer Vision 2003, IBM Tech. Rep. RC22886. [2] D. A. Fidaleo, H.-A. Nguyen, and M. Trivedi, “The networked sensor tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks,” in Proc. ACM 2nd Int. Workshop Video Surveillance Sensor Networks, New York, 2004, pp. 46–53. [3] E. Newton, L. Sweeney, and B. Malin, Preserving Privacy by De-Identifying Facial Images Carnegie Mellon Univ., 2003, Tech. Rep. CMU-CS-03-119. [4] T. E. Boult, “PICO: Privacy through Invertible Cryptographic Obscuration,” in Proc. IEEE/NSF Workshop Comput. Vis. Interactive Intell. Environ., Nov. 2005, pp. 27–38. [5] F. Dufaux and T. Ebrahimi, “Video Surveillance using JPEG 2000,” in SPIE Proc. Applications of Digital Image Processing XXVII, Denver, CO, Aug. 2004, pp. 268–275. [6] I. P. Martinez, X. Desurmont, J. Meessen, and J.-F. Delaigle, “Robust human face hiding ensuring privacy,” in Proc. Int. Workshop Image Anal. Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, Apr. 2005. [7] F. Dufaux and T. Ebrahimi, “Scrambling for video surveillance with privacy,” in Proc. IEEE Workshop on Privacy Research In Vision, New York, Jun. 2006, p. 160. [8] W. Zhang, S. S. Cheung, and M. Chen, “Hiding privacy information in video surveillance system,” in Proc. IEEE Int. Conf. Image Process., Genova, Italy, Sep. 2005, pp. II-868–II-871. [9] F. Dufaux and T. Ebrahimi, “Recent advances in MPEG-7 cameras,” in SPIE Proc. Applications of Digital Image Processing XXIX, San Diego, CA, Aug. 2006, vol. 6312, pp. 631211.1–631211.8. [10] [Online]. Available: http://www.eptascape.com/products/eptacam.htm [11] D. Taubman and M. Marcellin, JPEG 2000: Image Compression Fundamentals, Standards and Practice. Norwell, MA: Kluwer, 2002. [12] T. Ebrahimi and F. Pereira, The MPEG-4 Book. Englewood Cliffs, NJ: Prentice-Hall, 2002. [13] ISO/IEC 14496-7/DAM1 Optimized Reference Software for Coding of Audio-Visual Objects, , Mar. 2003, ISO/IEC JTC1/SC29/WG11 WG11N5550. (a) (b) Fig. 11. Privacy protection scrambling in a real video surveillance setting: (a) original sequence and (b) with transform-domain scrambling. real-time DSP implementation of background/foreground segmentation, MPEG-4 encoding and scrambling. The scrambling is using the transform-domain approach where 63 ac coefficients are pseudorandomly scrambled. Results are shown in Fig. 11. It can be observed that both pedestrians and moving cars are successfully scrambled. V. CONCLUSION In this paper, we have described a technique to address the issue of privacy in video surveillance. Regions of interest, assumed to correspond to privacy-sensitive data, are scrambled. In one approach, scrambling is applied in the transform-domain by pseudorandomly flipping the sign of transform ac coefficients or by pseudorandomly modifying dc coefficients. In a second approach, scrambling is performed directly on the compressed codestream by pseudorandomly inversing some bits corresponding to ac coefficients. Simulation results show that the proposed scrambling techniques are successful at concealing privacy-sensitive information while leaving the scene comprehensible. The protection depends on a secret encryption key and the process is fully reversible for authorized users, e.g., law-enforcement authorities, in possession of the latter. After scrambling, the resulting codestream is still standard compliant. Simulations results show that this is obtained with a negligible impact on coding efficiency and a small computational complexity. Moreover, the scrambling process is flexible and the amount of distortion introduced

You May Also Find These Documents Helpful

  • Good Essays

    In 1992, Dallmeier presented the world’s first video sensor with digital image storage. At this time, the idea of using digital image storage in video surveillance wasn’t taken seriously but Dallmeier saw its benefits and potential. In retrospect, this idea has proved to be a groundbreaking development, one that has revolutionized video surveillance. Today we cannot imagine the security field without the use of digital technology.Panomera® is a completely novel camera technology, which was specially developed for the all-encompassing video surveillance of expansive areas. With Panomera®, huge widths, as well as areas with large distances can be displayed with a completely new resolution quality, in real time and at high frame rates of up to 30 fps.While other video analysis systems are limited to pure motion detection, Dallmeier uses SEDOR® – an abbreviation for “Self Learning Event Detector” – a self-learning analysis system. Using intelligent picture analysis algorithms and self-learning detection systems a variety of different situations can be automatically recognised even in complex scenes. For example, object sizes, directions of movement and speeds can be analysed. Environmental influences like rain, snow or branches blowing in the wind are filtered out using special algorithms.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    concerns with the camera is the privacy and security (Hermann and Weiner). Privacy towards the…

    • 878 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    We currently live in a world that surveillance camera are used almost everywhere, at homes and businesses, airports, etc. They are also used by law enforcement to conduct investigation. Since the 2001 terrorist attack, cameras have increased (Surette, 2015). One of the issues with surveillance camera that many individuals bring up is that it violates their privacy. Expectation of privacy is one of the many things that the public is concern. Surveillance cameras should be acceptable and it should not matter whether they are hidden or openly displayed if there is no reasonable expectation of privacy. For example, any person that step foot outside of their home and go to the store, or on the road, or to any business open to the public should be…

    • 221 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Recently “webcam hacking” has become a major concern in our modern world. Similar to the telecsreens found in 1984, webcams have the capability of constantly monitoring computer users. According to The Guardian, “Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing.” It is evident that our technology has the capability to surveil computer users at any moment.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Good Essays

    To further elaborate on advanced cameras, CNN commented on the “new, chilling, face recognition technology.” With this new technology, it is possible to instantaneously identify people who are caught on camera through facial images that are in government databases. CNN stated that face recognition technology is “a wonderful way for government to spy on its citizens who went to the antigovernment rally” (Strossen 127). CNN could have used a better choice of words rather than “to spy on,” for the simple fact that it’s invading the privacy of the people rather than protecting them. This statement alone could help strengthen Strossen’s weak argument. However,…

    • 523 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The progress of surveillance technology has come so far that it is almost impossible to contain it. Within a much bigger situation it is because we rely on it in the first place. This dependency is stimulated by our own use of surveillance technologies, tracking and our unhealthy want to see ourselves and others. The needs for these surveillance technologies in the commercial and governmental categories are unappeasable.…

    • 2637 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    “Surveillance cameras have become far more sophisticated since their invention in 1942. Cameras can now show images in full color and high definition and can be remotely controlled by computers” ( Godwin, Christopher. ) As cameras become more advanced, They can be used for stopping people from…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    This essay will aim to critically discuss CCTV cameras as a proven method of crime control and prevention tool. In order to analyse academic, official and Non Government Organisation (NGO) studies, it is important to consider the rise of CCTV. CCTV is the one of the fastest growing forms of surveillance and crime control in the UK. CCTV was gradually diffused throughout the retail and transport sectors to the public domain. In 1991 there were no more than ten cities with open street systems in operation; these systems were set up individuals on the basis of entrepreneurship. (Dutton and Short 1998)…

    • 3240 Words
    • 13 Pages
    Best Essays
  • Good Essays

    Surveillance Cameras

    • 567 Words
    • 3 Pages

    Nadine Strossen is the authors of “Everyone is watching you” an article that its main purpose is to alert readers how our privacy rights are been violated by surveillance cameras. The article in general informs the reader of the topic right from the beginning with the title which explains a lot of the matter to discuss. The author introduces the topic very clear with the example of Eric Blair the author of “Big Brother is watching you” and how this caption relates to the matter. I have two reasons to believe that this article will not captive’s people’s attention. First, it does not give a lot of examples on the matter base on what the majority of the citizens live style is. Second yes, the article puts the problem out there but it gives no clear solution on how to fix it.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Freund, K. (2015). When Cameras Are Rolling: Privacy Implications of Body-Mounted Cameras on Police. Columbia Journal Of Law…

    • 515 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Privacy, the state of being free from a public attention, is a very sensitive and debatable topic in today’s world. What is an invasion of privacy? It is the invasion into another personal life of another individual, with no cause. Law enforcement cameras are cameras, body worn police cameras, and hidden cameras of all types. Closed circuit television, also known as surveillance, is the use of video cameras to transmit a signal to a specific place or close observation, especially of a suspected spy or criminal, on a limited set of monitors. One of the reasons the government provides law enforcement cameras is for protection and safety for the community. The governmental surveillance is not about the government collecting the information…

    • 1052 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Everyone leaves personal digital tracks in systems whenever he or she make a purchase, takes a trip, uses a bank account, make a phone call, walks past a security camera, obtains a prescription, send or receives a package, files income tax forms, applies for a loan, e-mails a friend, sends a fax, rent a video, or engages in just about any other activity. The security camera increases the scope and nature of available data. Law-abiding citizens, criminal and terrorist leave extensive digital tracks. Gathering and analyzing electronic and behavioral information can play major roles in detecting and preventing terrorist…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1984 Pros And Cons Essay

    • 631 Words
    • 3 Pages

    Since 9/11 and other tragedies such as the Boston Marathon bombing surveillance in many ways has increased significantly. One of the most significant ways is through the use and implementation of high-tech security systems, "As the volume and quality of cameras and sensors increases, cities are turning to more advanced face and object recognition software to make sense of the data"(CNN2). One of…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Technology and Privacy

    • 1148 Words
    • 5 Pages

    Nowdays, we are living in the age of the "Big Brother", that is not only a TV program but it is a real condition of everyone: when you enter a bank or a shop, when you go to the cinema or to a restaurant, when you take the bus, the train or you are in the underground or in an airport, when you are driving your car in your city or in the highway, you could imagine that a videocamera is focusing on you!…

    • 1148 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The problem with continuous recording raises many privacy issues, for the public as well as for officers. For example, crime victims (especially victims of rape, abuse, and other sensitive crimes), as well as witnesses who are concerned about…

    • 1325 Words
    • 4 Pages
    Better Essays

Related Topics