Awareness and coordination in shared workspaces
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Evaluating image filtering based techniques in media space applications
CSCW '98 Proceedings of the 1998 ACM conference on Computer supported cooperative work
Controlled access and dissemination of XML documents
Proceedings of the 2nd international workshop on Web information and data management
Perceptual user interfaces: things that see
Communications of the ACM
Learning Patterns of Activity Using Real-Time Tracking
IEEE Transactions on Pattern Analysis and Machine Intelligence
The effects of filtered video on awareness and privacy
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Robot Vision
A Histogram-Based Color Consistency Test for Voxel Coloring
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 4 - Volume 4
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Face recognition: A literature survey
ACM Computing Surveys (CSUR)
Experiential Sampling for video surveillance
IWVS '03 First ACM SIGMM international workshop on Video surveillance
A novel approach for privacy-preserving video sharing
Proceedings of the 14th ACM international conference on Information and knowledge management
Multimedia simplification for optimized MMS synthesis
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A novel distributed privacy paradigm for visual sensor networks based on sharing dynamical systems
EURASIP Journal on Applied Signal Processing
Privacy and the access of information in a smart house environment
Proceedings of the 15th international conference on Multimedia
Dynamic privacy assessment in a smart house environment using multimodal sensing
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Efficient object-based video inpainting
Pattern Recognition Letters
Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Middleware for pervasive spaces: balancing privacy and utility
Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware
A semantic approach for building pervasive spaces
Proceedings of the 6th Middleware Doctoral Symposium
Audio-visual privacy protection for video conference
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
A framework for the design of privacy preserving pervasive healthcare
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Enhancing privacy management support in instant messaging
Interacting with Computers
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Privacy preserving: hiding a face in a face
ACCV'07 Proceedings of the 8th Asian conference on Computer vision - Volume Part II
Middleware for pervasive spaces: balancing privacy and utility
Middleware'09 Proceedings of the ACM/IFIP/USENIX 10th international conference on Middleware
Recoverable privacy protection for video content distribution
EURASIP Journal on Information Security - Special issue on enhancing privacy protection in multimedia systems
IEEE Transactions on Information Technology in Biomedicine
The Internet of Things: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A systematic approach towards user-centric privacy and security for smart camera networks
Proceedings of the Fourth ACM/IEEE International Conference on Distributed Smart Cameras
Privacy preserving video surveillance using pedestrian tracking mechanism
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Video data hiding for managing privacy information in surveillance systems
EURASIP Journal on Information Security - Special issue on enhancing privacy protection in multimedia systems
Three-level privacy control for sensing-based real-world content Digital Diorama
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
Proceedings of the Seventh Symposium on Usable Privacy and Security
Adaptive transformation for robust privacy protection in video surveillance
Advances in Multimedia
Crowdsourcing approach for evaluation of privacy filters in video surveillance
Proceedings of the ACM multimedia 2012 workshop on Crowdsourcing for multimedia
Threat-based evaluation for context-aware multimedia surveillance system
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Multimedia Tools and Applications
Hi-index | 0.01 |
Around the world as both crime and technology become more prevalent, officials find themselves relying more and more on video surveillance as a cure-all in the name of public safety. Used properly, video cameras help expose wrongdoing but typically come at the cost of privacy to those not involved in any maleficent activity. What if we could design intelligent systems that are more selective in what video they capture, and focus on anomalous events while protecting the privacy of authorized personnel? This paper proposes a novel way of combining sensor technology with traditional video surveillance in building a privacy protecting framework that exploits the strengths of these modalities and complements their individual limitations. Our fully functional system utilizes off the shelf sensor hardware (i.e. RFID, motion detection) for localization, and combines this with a XML-based policy framework for access control to determine violations within the space. This information is fused with video surveillance streams in order to make decisions about how to display the individuals being surveilled. To achieve this, we have implemented several video masking techniques that correspond to varying user privacy levels. These results were achievable in real-time at acceptable frame rates, while meeting our requirements for privacy preservation.