Access control, confidentiality and privacy for video surveillance databases

In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discussed an access control model and accedes control algorithms for confidentiality. Finally we discuss privacy preserving video surveillance. Our goal is build a comprehensive system that can detect suspicious events, ensure confidentiality as well as privacy.

[1]  Bhavani M. Thuraisingham,et al.  A framework for a video analysis tool for suspicious event detection , 2005, MDM '05.

[2]  Jianping Fan,et al.  A hierarchical access control model for video database systems , 2003, TOIS.

[3]  Takeo Kanade,et al.  Algorithms for cooperative multisensor surveillance , 2001, Proc. IEEE.

[4]  Boaz Gelbord,et al.  New surveillance techniques raise privacy concerns , 2002, CACM.

[5]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[6]  Jianping Fan,et al.  Salient Objects: Semantic Building Blocks for Image Concept Interpretation , 2004, CIVR.

[7]  R. Armitage To CCTV or not to CCTV?: A review of current research into the effectiveness of CCTV systems in reducing crime , 2002 .

[8]  Koichi Sakurai,et al.  Security of Multimedia Systems , 2002 .

[9]  Vijayalakshmi Atluri,et al.  An authorization model for geospatial data , 2004, IEEE Transactions on Dependable and Secure Computing.

[10]  Jianping Fan,et al.  Automatic image segmentation by integrating color-edge extraction and seeded region growing , 2001, IEEE Trans. Image Process..

[11]  Elisa Bertino,et al.  A Logical Approach to Quality of Service Specification in Video Databases , 2004, Multimedia Tools and Applications.

[12]  Sharath Pankanti,et al.  Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.

[13]  Jianping Fan,et al.  A novel approach for privacy-preserving video sharing , 2005, CIKM '05.

[14]  Sharath Pankanti,et al.  Blinkering Surveillance: Enabling Video Privacy through Computer Vision , 2004 .

[15]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.