A utility-driven surveillance approach to trade-off security and privacy

In recent years advances in machine learning methods such as deep learning has led to significant improvements in our ability to track people and vehicles, and to recognise specific individuals. Such technology has enormous potential to enhance the performance of image-based security systems. However, wide-spread use of such technology has important legal and ethical implications, not least for individuals right to privacy. In this paper, we describe a technological approach to balance the two competing goals of system efficacy and privacy. We describe a methodology for constructing a “goal-function” that reflects the operators preferences for detection performance and anonymity. This goal function is combined with an image-processing system that provides tracking and threat assessment functionality and a decision-making framework that assesses the potential value gained by providing the operator with de-anonymized images. The framework provides a probabilistic approach combining user preferences, world state model, possible user actions and threat mitigation effectiveness, and suggests the user action with the largest estimated utility. We show results of operating the system in a perimeter-protection scenario

[1]  Liang Zhao,et al.  Achieving Pareto-Optimal MI-Based Privacy-Utility Tradeoffs Under Full Data , 2018, IEEE Journal of Selected Topics in Signal Processing.

[2]  An architecture for sensor modular autonomy for counter-UAS , 2018, Security + Defence.

[3]  E. Rowland Theory of Games and Economic Behavior , 1946, Nature.

[4]  Paul A. Thomas,et al.  Towards an autonomous sensor architecture for persistent area protection , 2016, Security + Defence.

[5]  Xu Tang,et al.  PyramidBox: A Context-assisted Single Shot Face Detector , 2018, ECCV.

[6]  Shuo Yang,et al.  WIDER FACE: A Face Detection Benchmark , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[7]  Gabriel C. Birch,et al.  History and Evolution of the Johnson Criteria. , 2015 .

[8]  Ross B. Girshick,et al.  Mask R-CNN , 2017, 1703.06870.

[9]  Henri Bouma,et al.  Long-term behavior understanding based on the expert-based combination of short-term observations in high-resolution CCTV , 2016, Security + Defence.

[10]  Henri Bouma,et al.  Flexible human-definable automatic behavior analysis for suspicious activity detection in surveillance cameras to protect critical infrastructures , 2018, Security + Defence.

[11]  Pietro Perona,et al.  Microsoft COCO: Common Objects in Context , 2014, ECCV.

[12]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[13]  John R. Boyd,et al.  The Essence of Winning and Losing , 2012 .

[14]  J. Pratt RISK AVERSION IN THE SMALL AND IN THE LARGE11This research was supported by the National Science Foundation (grant NSF-G24035). Reproduction in whole or in part is permitted for any purpose of the United States Government. , 1964 .