Society: sensors & sensibility
IEEE Spectrum
Enabling Video Privacy through Computer Vision
IEEE Security and Privacy
Distributed Interactive Video Arrays for Event Capture and Enhanced Situational Awareness
IEEE Intelligent Systems
Scrambling for Video Surveillance with Privacy
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Model-Based Face De-Identification
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
ACM Computing Surveys (CSUR)
Intelligent Distributed Video Surveillance Systems (Professional Applications of Computing) (Professional Applications of Computing)
Automated Visual Surveillance in Realistic Scenarios
IEEE MultiMedia
Autonomous multicamera tracking on embedded smart cameras
EURASIP Journal on Embedded Systems
Security and Privacy in Pervasive Computing
IEEE Pervasive Computing
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Hi-index | 0.00 |
This paper analyzes the requirements of an ideal vision system. Two major challenges are identified -- security and privacy. Security ensures a reliable and dependable operation where the whole chain is robust against modifications and erasures. This comprises the aspect of authenticity to qualify for legal actions on one hand and to prevent (e.g., man in the middle) attacks from modifying content to burden innocent persons. Privacy is strongly penetrated by today's surveillance systems. It has to be ensured that both the derived video analysis results and the adequately filtered imaging stream (if still required) are only accessible to adequate user groups to address the privacy dilemma. A vision based sensor should be applicable in the same application fields as other non-camera based application specific sensors, e.g., photoelectric sensors used in mens' restroom facilities (urinals/pissoirs) -- with the same confidence and trust. Related work is surveyed and a first concept is introduced to address these demands. It is based on a smart camera approach and various certification and authentification mechanisms to allow application specific sensors to use the power of the visual modality without the traditional drawbacks. Different use cases are discussed from the point of view of the persons surveilled, persons intending to modify and persons utilizing the results. Finally, the "survmotion" system is presented where some aspects of the concept are implemented to illustrate the potential applicability in various fields.