2011
DOI: 10.1007/s00530-011-0245-x
|View full text |Cite
|
Sign up to set email alerts
|

A general framework for managing and processing live video data with privacy protection

Abstract: Though a large body of existing work on video surveillance focuses on image and video processing techniques, few address the usability of such systems, and in particular privacy issues. This study fuses concepts from stream processing and content-based image retrieval to construct a privacy-preserving framework for rapid development and deployment of video surveillance applications. Privacy policies, instantiated to as privacy filters, may be applied both granularly and hierarchically. Privacy filters are gran… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(20 citation statements)
references
References 27 publications
0
20
0
Order By: Relevance
“…These privacy-preserving techniques basically rely on image processing algorithms such as scrambling by JPEG-masking [35], in-painting [15], pixelation [22], blanking [3], replacement with silhouettes [59], blurring [36], warping or morphing [29]. In a recent workshop dedicated protection methods have been proposed in order to solve the specified visual privacy task [5,19,20,30,34,40,41,49].…”
Section: Related Workmentioning
confidence: 99%
“…These privacy-preserving techniques basically rely on image processing algorithms such as scrambling by JPEG-masking [35], in-painting [15], pixelation [22], blanking [3], replacement with silhouettes [59], blurring [36], warping or morphing [29]. In a recent workshop dedicated protection methods have been proposed in order to solve the specified visual privacy task [5,19,20,30,34,40,41,49].…”
Section: Related Workmentioning
confidence: 99%
“…A lot of research efforts in image privacy have focused on approaches to incorporate privacy protection into existing security surveillance systems and frameworks, typically, by implementing access rights management and privacy policies [2][3] [4]. Another large body of work is on the development of algorithms and methods to protect visual privacy, such as using watermarking to hide visual personal information [5], scrambling techniques to reversibly distort privacy sensitive regions [6], removal of unauthorized personnel from the video feed [7], and encoder independent geometrical-based reversible distortions [8] [9].…”
Section: Related Workmentioning
confidence: 99%
“…As long as a correct scrambling key is provided, the region can be recovered. We have implemented the proposed scrambling algorithm in both transcoder and encoder/decoder using an open source JPEG library by Independent JPEG Group 4 . The process of a multi-region scrambling and selective descrambling is illustrated in Fig.…”
Section: Secure Jpeg Scramblingmentioning
confidence: 99%
“…At the technical level this work broadly breaks down into two solutions spaces: Privacy may be enforced at the source level through appropriate image or video processing and encryption techniques; [1][2][3][4][5] Or it may be enforced at the media storage and server level through appropriate enforcement of access policies. [6][7][8][9] Sharing photos through OSNs substantially extends the challenge of e↵ective privacy management and control over that encountered in "closed" surveillance and security systems: The image source (e.g., the user's device) is no longer a part of the system infrastructure; the relationship between photo owner and OSN is not subject to a system policy or third-party oversight; and access control at the OSN is at the sole discretion of the OSN.…”
Section: Related Workmentioning
confidence: 99%