skip to main content
10.1145/3442520.3442524acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

A Privacy-Preserving Framework for Surveillance Systems

Published: 13 March 2021 Publication History

Abstract

The ability to visually track people present in the scene is essential for any surveillance system. However, the widespread deployment and increased advancement of video surveillance systems have raised awareness of privacy to the public, i.e., human identity in the videos. The existing indoor surveillance systems allow people to be watched remotely and recorded continuously but do not prevent any party from viewing activities and collecting personal visual information of people in the videos. Because of this problem, we propose a privacy-preserving framework to provide each user (e.g., parents) with a personalized video where the user see only selected target subjects (e.g., child, teacher, and intruder) while other faces are dynamically masked. The primary services in our framework consist of a video streaming service and a personalized service. The video streaming service is responsible for detecting, segmenting, recognizing, and masking face images of the human subjects in the video. Notably, it classifies human subjects into insider and outsider classes and then applies the de-identification (i.e., masking) to those in the insider class, including the target subjects. Subsequently, the personalized service receives the visual information (i.e., masked and unmasked faces) from the streaming service and processes it at the user's mobile device. The output is then a personalized video for each user. For security reasons, we require the surveillance videos stored in the cloud in an encrypted form. To ensure an individual remains anonymous in a group, we propose a dynamic masking approach to mask the human subjects in the video. Our framework can deliver both reliable visual privacy protection and video utility. For instance, users can have confidence that their target subjects are anonymized in other views. To utilize the personalized video, users can use analytics software installed on their mobile devices to analyze the activities of their target subjects.

References

[1]
Aaron, S. J., Adrian, B., Vasileios A., and Georgios, T. 2017. Large pose 3D face reconstruction from a single image via direct volumetric CNN regression. In Proceedings of the IEEE International Conference on Computer Vision (Venice, Italy, October 22–29, 2017). ICCV’17. IEEE, 1031–1039. DOI=http://doi.acm.org/10.1109/ICCV.2017.117.
[2]
Abu-El-Haija, S., Kothari, N., Lee, J., Natsev, P., Toderici, G., Varadarajan, B. and Vijayanarasimhan, S., 2016. Youtube-8m: A large-scale video classification benchmark.  arXiv:1609.08675. Retrieved from https://arxiv.org/abs/1609.08675.
[3]
Alice, J. O., Jonathon, P., Samuel, W., Dana, A. R., Julianne, A., Robert, B., and Joseph, D. 2011. Recognizing people from dynamic and static faces and bodies: Dissecting identity with a fusion approach. Vision research, 51, 1 (2011), 74–83. DOI=https://doi.org/10.1016/j.visres.2010.09.035.
[4]
Bitouk, D., Kumar, N., Dhillon, S., Belhumeur, P. and Nayar, S.K., 2008. Face swapping: automatically replacing faces in photographs. ACM Trans. Graph. 27, 3 (August 2008), 1–8. DOI=https://doi.org/10.1145/1360612.1360638.
[5]
Chhabra, S., Singh, R., Vatsa, M. and Gupta, G., 2018. Anonymizing k-facial attributes via adversarial perturbations. In Proceedings of the 27th International Joint Conference on Artificial Intelligence (Stockholm, Sweden, July 13-19). IJCAI’18. IJCAI, California, 656-662. DOI=https://doi.org/10.24963/ijcai.2018/91.
[6]
Dai, J., Saghafi, B., Wu, J., Konrad, J. and Ishwar, P., 2015, September. Towards privacy-preserving recognition of human activities. In Proceedings of the IEEE International Conference on Image Processing (Quebec City, Canada, September 27-30). ICIP’15. IEEE Computer Society, 4238-4242. DOI=https://doi.org/10.1109/ICIP.2015.7351605.
[7]
Danny, B. 2019. Researchers Hack Camera in Fake Video Attack. (August 2019). Retrieved May 3, 2020 from https://nakedsecurity.sophos.com/2019/08/01/researchers-hack-camera-in-fake-video-attack/.
[8]
Du, L. and Li, Y., 2014, October. Privacy preserving for human object in video surveillance via visual cryptography. In Proceedings IEEE International Conference on Security, Pattern Analysis, and Cybernetics (Wuhan, China, October 18-19). SPAC’14. IEEE Computer Society, 80-85. DOI=https://doi.org/10.1109/SPAC.2014.6982661.
[9]
Hukkelås, H., Mester, R. and Lindseth, F., 2019. Deepprivacy: A generative adversarial network for face anonymization. In Proceedings of the International Symposium on Visual Computing (Lake Tahoe, NV, USA, October 07-09). ISVC’19. Springer, Cham, 565-578. DOI=https://doi.org/10.1007/978-3-030-33720-9_44.
[10]
Jana, S., Narayanan, A. and Shmatikov, V., 2013, May. A scanner darkly: Protecting user privacy from perceptual applications. In Proceedings of the 34th IEEE symposium on security and privacy (San Fancisco, CA, May 19-22). S&P’13. IEEE Computer Society, 349-363. DOI=https://doi.org/10.1109/SP.2013.31.
[11]
Jourabloo, A., Yin, X. and Liu, X. 2015. Attribute preserved face de-identification. In Proceedings of the International conference on biometrics (Phuket, Thailand, May 19-22, 2015). ICB’15. IEEE Computer Society, 278-285. DOI=https://doi.org/10.1109/ICB.2015.7139096.
[12]
Liu, F. and Koenig, H., 2010. A survey of video encryption algorithms. Comput. Security. 29, 1 (Feb. 2010), 3-15. DOI= https://doi.org/10.1016/j.cose.2009.06.004.
[13]
Lu, Y., Tai, Y.W. and Tang, C.K., 2018. Attribute-guided face generation using conditional cyclegan. In Proceedings of the 15th European Conference on Computer Vision (Munich Germany, September 08-14). ECCV’18. Springer, Berlin, Heidelberg, 282-297. DOI=https://doi.org/10.1007/978-3-030-01258-8_18.
[14]
Neil, C. 2018. Chinese school uses facial recognition to monitor student attention in class. (May 2018) Retrieved June 4, 2020 from https://www.telegraph.co.uk/news/2018/05/17/chinese-school-uses-facial-recognition-monitor-student-attention/.
[15]
Newton, E.M., Sweeney, L. and Malin, B., 2005. Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17, 2 (Feb. 2005), 232-243. DOI=https://doi.org/10.1109/TKDE.2005.32.
[16]
Parameshachari, B. D., and Soyjaudah, K. M. S. 2012. Analysis and comparison of fully layered image encryption techniques and partial image encryption techniques. In Proceedings of the International Conference on Information Processing (Bangalore, India, August 10-12). ICIP’12. Springer, Berlin, Heidelberg, 599–604. DOI= https://doi.org/10.1007/978-3-642-31686-9_70.
[17]
Ryoo, M.S., Rothrock, B., Fleming, C. and Yang, H.J., 2017. Privacy-preserving human activity recognition from extreme low resolution. In Proceedings of the 31st AAAI Conference on Artificial Intelligence (San Francisco, California, February 04-09). AAAI’17. ACM, New York, NY, 4255–4262. DOI=https://doi.org/10.5555/3298023.3298185.
[18]
Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S. and Goldberg, K., 2009. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Protecting Privacy in Video Surveillance. 65-89, Springer, London. DOI=https://doi.org/10.1007/978-1-84882-301-3_5.
[19]
Schroff, F., Kalenichenko, D. and Philbin, J., 2015. FaceNet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (Boston, MA, USA, June 07-12). CVPR’15. IEEE Computer Society, 815–823. DOI=https://doi.org/10.1109/CVPR.2015.7298682.
[20]
Sen, N., Dantu, R., Vempati, J. and Thompson, M., 2018, June. Performance Analysis of Elliptic Curves for Real-Time Video Encryption. In Proccedings of the National Cyber Summit (Huntsville, AL, USA, June 05-07). NCS’18. IEEE Computer Society, 67-71. DOI=https://doi.org/10.1109/NCS.2018.00015.
[21]
Viola, P. and Jones, M.J., 2004. Robust real-time face detection. Int. J. Comput. Vision, 57, 2 (May. 2014) 137-154. DOI=https://doi.org/10.1023/B:VISI.0000013087.49260.fb.
[22]
Wong, K.S., Maratkhan, A., Tu, N.A. and Demirci, M.F., 2019. Towards Self-Enforcing Privacy Protection for Surveillance System. (June 2019). Retrieved May 20, 2020 from https://cvcops19.cispa.saarland/#.
[23]
Zeng, H. and Ji, L., 2018. An encryption method for mobile video surveillance system based on ZUC algorithm. In Proceedings of the 8th International Congress of Information and Communication Technology (Nanning, China, January 11–13). ICICT’18. Elsevier, 282-288. DOI=https://doi.org/10.1016/j.procs.2018.04.215.

Cited By

View all
  • (2022)Event-driven Re-Id: A New Benchmark and Method Towards Privacy-Preserving Person Re-Identification2022 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW)10.1109/WACVW54805.2022.00052(459-468)Online publication date: Jan-2022
  • (2022)A High-Speed FPGA Implementation of AES for Large Scale Embedded Systems and its Applications2022 13th International Conference on Information and Communication Systems (ICICS)10.1109/ICICS55353.2022.9811140(59-64)Online publication date: 21-Jun-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCNS '20: Proceedings of the 2020 10th International Conference on Communication and Network Security
November 2020
145 pages
ISBN:9781450389037
DOI:10.1145/3442520
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 March 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Human de-identification
  2. Privacy-preserving framework
  3. Surveillance systems
  4. Visual privacy protection

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCNS 2020

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)40
  • Downloads (Last 6 weeks)3
Reflects downloads up to 23 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Event-driven Re-Id: A New Benchmark and Method Towards Privacy-Preserving Person Re-Identification2022 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW)10.1109/WACVW54805.2022.00052(459-468)Online publication date: Jan-2022
  • (2022)A High-Speed FPGA Implementation of AES for Large Scale Embedded Systems and its Applications2022 13th International Conference on Information and Communication Systems (ICICS)10.1109/ICICS55353.2022.9811140(59-64)Online publication date: 21-Jun-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media