Visual Surveillance Within the EU General Data Protection Regulation: A Technology Perspective

From an individual’s perspective, technological advancement has merits and demerits. Video captured by surveillance cameras while a person goes about their daily life may improve their personal safety but the images collected may also represent an invasion of their privacy. Because of the ease of digital information sharing, there exists a need to protect that visual information from illegal utilization by untrusted parties. The European parliament has ratified the General Data Protection Regulation (GDPR), which has been effective since May 2018 with a view to ensuring the privacy of European Union (EU) citizens’ and visitors’ personal data. The regulation has introduced data safeguards through Pseudonymisation, Encryption, and Data protection-by-design. However, the regulation does not assist with technical and implementation procedures, such as video redaction, to establish those safeguards. This paper refers to the GDPR term “personal data” as “visual personal data” and aims to discuss regulatory safeguards of visual privacy, such as reversible protection, from the technological point-of-view. In the context of GDPR, the roles of machine learning (i.e. within computer vision), image processing, cryptography, and blockchain are explored as a way of deploying Data Protection-by-Design solutions for visual surveillance data. The paper surveys the existing market-based data protection solutions and provides suggestions for the development of GDPR-compliant Data Protection-by-Design video surveillance systems. The paper is also relevant for those entities interacting with EU citizens from outside the EU and for those regions not currently covered by such regulation that may soon implement similar provisions.

[1]  Damian George,et al.  GDPR bypass by design? Transient processing of data under the GDPR , 2019 .

[2]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[3]  A. Cavallaro Privacy in Video Surveillance , 2007 .

[4]  R. Buyya,et al.  Object Oriented Programming with Java : Essentials and Applications , 2009 .

[5]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[6]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[7]  Alexandros André Chaaraoui,et al.  Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..

[8]  Sophie Stalla-Bourdillon,et al.  Anonymous Data v. Personal Data — A False Debate: An EU Perspective on Anonymization, Pseudonymization and Personal Data , 2017 .

[9]  Christian Damsgaard Jensen,et al.  Video Surveillance: Privacy Issues and Legal Compliance , 2015 .

[10]  Ali Farhadi,et al.  You Only Look Once: Unified, Real-Time Object Detection , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[11]  Mingda Liu,et al.  VideoChain: Trusted Video Surveillance Based on Blockchain for Campus , 2018, ICCCS.

[12]  M. Nixon,et al.  People Detection and Recognition using Gait for Automated Visual Surveillance , 2006 .

[13]  Anna Romanou,et al.  The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise , 2017, Comput. Law Secur. Rev..

[14]  Robert P. Loce,et al.  Video redaction: a survey and comparison of enabling technologies , 2017, J. Electronic Imaging.

[15]  Martin Fleury,et al.  Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes , 2017, J. Vis. Commun. Image Represent..

[16]  Jouni Markkula,et al.  EU General Data Protection Regulation: Changes and implications for personal data collecting companies , 2017, Comput. Law Secur. Rev..

[17]  Frederic Dufaux,et al.  Video scrambling for privacy protection in video surveillance: recent results and validation framework , 2011, Defense + Commercial Sensing.

[18]  Jiwen Lu,et al.  Deep Video Hashing , 2017, IEEE Transactions on Multimedia.

[19]  Touradj Ebrahimi,et al.  A Reliable and Reversible Image Privacy Protection Based on False Colors , 2018, IEEE Transactions on Multimedia.

[20]  Fuqiang Zhou,et al.  FSSD: Feature Fusion Single Shot Multibox Detector , 2017, ArXiv.

[21]  IV CyrilHöschl,et al.  Recognition of Images Degraded by Gaussian Blur , 2015, CAIP.

[22]  Marc Alexa,et al.  Pixelated image abstraction with integrated user constraints , 2013, Comput. Graph..

[23]  Andrei Popov,et al.  Prohibiting RC4 Cipher Suites , 2015, RFC.

[24]  Gregory Epiphaniou,et al.  Blockchain for Modern Digital Forensics: The Chain-of-Custody as a Distributed Ledger , 2019, Blockchain and Clinical Trial.

[25]  Pawan Sinha,et al.  Recognizing Facial Slivers , 2018, Journal of Cognitive Neuroscience.

[26]  Noboru Babaguchi,et al.  PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction , 2008, MMM.

[27]  Paolo Tasca,et al.  Blockchain Technologies: The Foreseeable Impact on Society and Industry , 2017, Computer.

[28]  Andreas Uhl,et al.  Identifying deficits of visual security metrics for images , 2016, Signal Process. Image Commun..

[29]  Mohammed Ghanbari,et al.  Confidentiality of a selectively encrypted H.264 coded video bit-stream , 2014, J. Vis. Commun. Image Represent..

[30]  Pawan Sinha,et al.  Face Recognition by Humans: Nineteen Results All Computer Vision Researchers Should Know About , 2006, Proceedings of the IEEE.

[31]  Bernhard Rinner,et al.  Adaptive cartooning for privacy protection in camera networks , 2014, 2014 11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).

[32]  Keiichi Iwamura,et al.  Mosaic-based privacy-protection with reversible watermarking , 2015, 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE).

[33]  Steven M. Bellovin,et al.  Guidelines for Cryptographic Key Management , 2005, RFC.

[34]  Harald Vranken,et al.  Sustainability of bitcoin and blockchains , 2017 .

[35]  Gora Chand Nandi,et al.  Human Gait State Prediction Using Cellular Automata and Classification Using ELM , 2018, Advances in Intelligent Systems and Computing.

[36]  Sharath Pankanti,et al.  Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.

[37]  Liesbet van Zoonen,et al.  Privacy concerns in smart cities , 2016, Gov. Inf. Q..

[38]  Martin Fleury,et al.  Lightweight Cipher for H.264 Videos in the Internet of Multimedia Things with Encryption Space Ratio Diagnostics , 2019, Sensors.

[39]  Mark Elliot,et al.  Are 'pseudonymised' data always personal data? Implications of the GDPR for administrative data research in the UK , 2018, Comput. Law Secur. Rev..

[40]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.