Privacy in video surveilled areas

We present a system prototype for self-determination and privacy enhancement in video surveilled areas by integrating computer vision and cryptographic techniques into networked building automation systems. This paper describes research work that has been done within the first half of the collaborative blue-c-II project and is conducted by an interdisciplinary team of researchers. Persons in a video stream control their visibility on a per-viewer base and can choose to allow either the real view or an obscured image to be seen. The parts of the video stream that show a person are protected by an AES cipher and can be sent over untrusted networks. Experimental results are presented by the example of a meeting room scenario. The paper concludes with remarks on the usability and encountered problems.

[1]  Andrew Harrison The Intelligent Building in Europe , 1992 .

[2]  Teresa Caldeira,et al.  Variations on a Theme Park: The New American City and the End of Public Space , 1994 .

[3]  W. Eric L. Grimson,et al.  Adaptive background mixture models for real-time tracking , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).

[4]  Larry S. Davis,et al.  M2Tracker: A Multi-view Approach to Segmenting and Tracking People in a Cluttered Scene Using Region-Based Stereo , 2002, ECCV.

[5]  Bruce Schneier,et al.  Practical cryptography , 2003 .

[6]  Rama Chellappa,et al.  An appearance based approach for human and object tracking , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[7]  Luc Van Gool,et al.  Bayesian Pixel Classification for Human Tracking , 2005, 2005 Seventh IEEE Workshops on Applications of Computer Vision (WACV/MOTION'05) - Volume 1.

[8]  Touradj Ebrahimi,et al.  Smart video surveillance system preserving privacy , 2005, Electronic Imaging: Image and Video Communications and Processing.

[9]  Sharath Pankanti,et al.  Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.