Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
The FERET Evaluation Methodology for Face-Recognition Algorithms
IEEE Transactions on Pattern Analysis and Machine Intelligence
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Using unknowns to prevent discovery of association rules
ACM SIGMOD Record
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Disclosure Limitation of Sensitive Rules
KDEX '99 Proceedings of the 1999 Workshop on Knowledge and Data Engineering Exchange
Privacy Preserving Association Rule Mining
RIDE '02 Proceedings of the 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02)
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Distortion tolerant pattern recognition based on self-organizing feature extraction
IEEE Transactions on Neural Networks
A novel approach for privacy-preserving video sharing
Proceedings of the 14th ACM international conference on Information and knowledge management
Factors on the sense of privacy in video surveillance
Proceedings of the 3rd ACM workshop on Continuous archival and retrival of personal experences
Tools for protecting the privacy of specific individuals in video
EURASIP Journal on Applied Signal Processing
k-Unlinkability: A privacy protection model for distributed data
Data & Knowledge Engineering
Face swapping: automatically replacing faces in photographs
ACM SIGGRAPH 2008 papers
HECOL: Homography and epipolar-based consistent labeling for outdoor park surveillance
Computer Vision and Image Understanding
Protecting privacy in recorded conversations
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Towards context-aware face anonymisation
Proceedings of the 7th International Conference on Mobile and Ubiquitous Multimedia
Computers in Biology and Medicine
Privacy Protection in Video Surveillance Systems Using Scalable Video Coding
AVSS '09 Proceedings of the 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Proceedings of the nineth ACM workshop on Digital rights management
Anonymous biometric access control based on homomorphic encryption
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Audio-visual privacy protection for video conference
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Privacy preserving: hiding a face in a face
ACCV'07 Proceedings of the 8th Asian conference on Computer vision - Volume Part II
PriSurv: privacy protected video surveillance system using adaptive visual abstraction
MMM'08 Proceedings of the 14th international conference on Advances in multimedia modeling
Anonymous biometric access control
EURASIP Journal on Information Security - Special issue on enhancing privacy protection in multimedia systems
Recoverable privacy protection for video content distribution
EURASIP Journal on Information Security - Special issue on enhancing privacy protection in multimedia systems
IEEE Transactions on Information Technology in Biomedicine
Privacy preserving video surveillance using pedestrian tracking mechanism
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Efficient privacy-preserving face recognition
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Video data hiding for managing privacy information in surveillance systems
EURASIP Journal on Information Security - Special issue on enhancing privacy protection in multimedia systems
Negotiating privacy preferences in video surveillance systems
IEA/AIE'11 Proceedings of the 24th international conference on Industrial engineering and other applications of applied intelligent systems conference on Modern approaches in applied intelligence - Volume Part II
Bubble trouble: off-line de-anonymization of bubble forms
SEC'11 Proceedings of the 20th USENIX conference on Security
YouProve: authenticity and fidelity in mobile sensing
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
Video surveillance: a distributed approach to protect privacy
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Privacy operating characteristic for privacy protection in surveillance applications
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Pairwise matching of spots in 2-DE images using hopfield network
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
Person de-identification in videos
ACCV'09 Proceedings of the 9th Asian conference on Computer Vision - Volume Part III
Integrating utility into face de-identification
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
A graph enrichment based clustering over vertically partitioned data
ADMA'11 Proceedings of the 7th international conference on Advanced Data Mining and Applications - Volume Part I
SensorSift: balancing sensor data privacy and utility in automated face understanding
Proceedings of the 28th Annual Computer Security Applications Conference
Hi-index | 0.00 |
In the context of sharing video surveillance data, a significant threat to privacy is face recognition software, which can automatically identify known people, such as from a database of drivers' license photos, and thereby track people regardless of suspicion. This paper introduces an algorithm to protect the privacy of individuals in video surveillance data by de-identifying faces such that many facial characteristics remain but the face cannot be reliably recognized. A trivial solution to de-identifying faces involves blacking out each face. This thwarts any possible face recognition, but because all facial details are obscured, the result is of limited use. Many ad hoc attempts, such as covering eyes, fail to thwart face recognition because of the robustness of face recognition methods. This paper presents a new privacy-enabling algorithm, named k-Same, that guarantees face recognition software cannot reliably recognize de-identified faces, even though many facial details are preserved. The algorithm determines similarity between faces based on a distance metric and creates new faces by averaging image components, which may be the original image pixels (k--Same-Pixel) or eigenvectors (k-Same-Eigen). Results are presented on a standard collection of real face images with varying k.