Abstract
Use of video surveillance has substantially increased in the last few decades. Modern video surveillance systems are equipped with techniques that allow traversal of data in an effective and efficient manner, giving massive powers to operators and potentially compromising the privacy of anyone observed by the system. Several techniques to protect the privacy of individuals have therefore been proposed, but very little research work has focused on the specific security requirements of video surveillance data (in transit or in storage) and on authorizing access to this data. In this paper, we present a general model of video surveillance systems that will help identify the major security and privacy requirements for a video surveillance system and we use this model to identify practical challenges in ensuring the security of video surveillance data in all stages (in transit and at rest). Our study shows a gap between the identified security requirements and the proposed security solutions where future research efforts may focus in this domain.
The work presented in this paper is supported by a grant from the Danish National Advanced Technology Foundation.
Chapter PDF
Similar content being viewed by others
References
Moncrieff, S., Svetha, V., Geoff, A.W.: Dynamic Privacy in Public Surveillance. Journal of Computer 42, 22–28 (2009)
Hampapur, A.: Smart Video Surveillance for Proactive Security. IEEE Signal Processing Magazine 25, 136 (2008)
Saini, M.K., Atrey, P.K., Mehrotra, S., Kankanhalli, M.S.: Privacy Aware Publication of Surveillance Video. International Journal of Trust Management in Computing and Communications 1, 23–51 (2013)
Frederic, D., Ebrahimi, T.: Scrambling for Privacy Protection in Video Surveillance Systems. IEEE Transactions on Circuits and Systems for Video Technology 18, 1168–1174 (2008)
Senior, A., Sharath, P., Arun, H., Lisa, B., Ying-Li, T., Ahmet, E., Jonathan, C., Chiao, F.S., Max, L.: Enabling Video Privacy Through Computer Vision. Journal of Security & Privacy 3, 50–57 (2005)
Cavallaro, A.: Privacy in Video Surveillance. IEEE Signal Processing Magazine 24, 168–169 (2007)
Norris, C., Armstrong, G.: The Maximum Surveillance Society. Berg (1999)
Criminisi, A., Perez, P., Toyama, K.: Object Removal by Exemplar-Based Inpainting. In: 13th IEEE Computer Visioin and Pattern Recognition, pp. 721–728. IEEE (2003)
Criminisi, A., Prez, P., Toyama, K.: Region Filling and Object Removal by Exemplar-Based Image Inpainting. IEEE Transactions on Image Processing 13, 1200–1212 (2004)
Tang, F., Ying, Y., Wang, J., Peng, Q.: A novel texture synthesis based algorithm for object removal in photographs. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, vol. 3321, pp. 248–258. Springer, Heidelberg (2004)
Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 65–89. Springer (2009)
Yu, X., Chinomi, K., Koshimizu, T., Nitta, N., Ito, Y., Babaguchi, N.: Privacy Protecting Visual Processing for Secure Video Surveillance. In: 15th IEEE International Conference on Image Processing, pp. 1672–1675. IEEE (2008)
Haritaoglu, I., Harwood, D., Davis, L.S.: W4: Real-Time Surveillance of People and their Activities. IEEE Transactions on Pattern Analysis and Machine Intelligence 22, 809–830 (2000)
Koshimizu, T., Toriyama, T., Babaguchi, N.: Factors on the Sense of Privacy in Video Surveillance. In: 3rd ACM Workshop on Continuous Archival and Retrival of Personal Experiences, pp. 35–44. ACM (2006)
Boult, T.E.: Pico: Privacy through Invertible Cryptographic Obscuration. In: IEEE Computer Vision for Interactive and Intelligent Environment, pp. 27–38. IEEE (2005)
Carrillo, P., Kalva, H., Magliveras, S.: Compression Independent Object Encryption for Ensuring Privacy in Video Surveillance. In: 9th IEEE International Conference on Multimedia and Expo, pp. 273–276. IEEE (2008)
Atrey, P.K., Yan, W., Kankanhalli, M.S.: A Scalable Signature Scheme for Video Authentication. Journal of Multimedia Tools and Applications 34, 107–135 (2007)
Schneider, M., Chang, S.: A Robust Content Based Digital Signature for Image Authentication. In: International Conference on Image Processing, pp. 227–230 (1996)
Sun, Q., He, D., Tian, Q.: A Secure and Robust Authentication Scheme for Video Transcoding. IEEE Transactions on Circuits and Systems for Video Technology 16, 1232–1244 (2006)
Winkler, T., Rinner, B.: Securing Embedded Smart Cameras with Trusted Computing. EURASIP Journal on Wireless Communications and Networking 2011, 20 (2011)
Winkler, T., Rinner, B.: TrustCAM: Security and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing. In: 7th IEEE Advanced Video and Signal Based Surveillance, pp. 593–600. IEEE (2010)
Winkler, T., Rinner, B.: A Systematic Approach Towards User-Centric Privacy and Security for Smart Camera Networks. In: 4th ACM/IEEE International Conference on Distributed Smart Cameras, pp. 133–141. ACM (2010)
Liu, X., Ahmet, M.E.: Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions. In: 2nd IASTED Conference on Communications, Internet & Information Technology (2003)
Liu, F., König, H.: Puzzle - A Novel Video Encryption Algorithm. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 88–97. Springer, Heidelberg (2005)
Socek, D., Magliveras, S., Marques, O., Kalva, H., Furht, B.: Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations. EURASIP Journal on Information Security (2007)
Liu, F., Hartmut, K.: A Survey of Video Encryption Algorithms. Journal of computers & security 29, 3–15 (2010)
Haskell, B.G., Puri, A., Netravali, A.N.: Digital Video: An Introduction to MPEG-2. Kluwer Academic Publishers (1998)
Schaffer, M., Schartner, P.: Video Surveillance: A Distributed Approach to Protect Privacy. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 140–149. Springer, Heidelberg (2005)
Liu, Z., Peng, D., Zheng, Y., Liu, J.: Communication Protection in IP-Based Video Surveillance Systems. In: 7th IEEE International Symposium on Multimedia, pp. 69–78. IEEE (2005)
Castiglione, A., Cepparulo, M., De Santis, A., Palmieri, F.: Towards a Lawfully Secure and Privacy Preserving Video Surveillance System. In: Buccafurri, F., Semeraro, G. (eds.) EC-Web 2010. LNBIP, vol. 61, pp. 73–84. Springer, Heidelberg (2010)
Brin, D.: The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom. Perseus Publishing (1999)
Bertino, E., Fan, J., Ferrari, E., Hacid, M., Elmagarmid, A.K., Zhu, X.: A Hierarchical Access Control Model for Video Database Systems. ACM Transactions on Information Systems 21, 155–191 (2003)
Bertino, E., Moustafa, A.H., Walid, A.G., Elmagarmid, A.K.: An Access Control Model for Video Database Systems. In: 9th International Conference on Information and Knowledge Management, pp. 336–343. ACM (2000)
Pan, L., Zhang, C.N.: A Web-Based Multilayer Access Control Model for Multimedia Applications in MPEG-7. International Journal of Network Security 4, 155–165 (2007)
Thuraisingham, B., Lavee, G., Bertino, E., Fan, J., Khan, L.: Access Control, Confidentiality and Privacy for Video Surveillance Databases. In: 11th ACM Symposium on Access Control Models and Technologies, pp. 1–10. ACM (2006)
Security Assertion Markup Language, OASIS Standard, http://saml.xml.org/wiki/saml-introduction
Web Services Federation Language (WS-Federation) Version 1.2, http://docs.oasis-open.org/wsfed/federation/v1.2/os/ws-federation-1.2-spec-os.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Rajpoot, Q.M., Jensen, C.D. (2014). Security and Privacy in Video Surveillance: Requirements and Challenges. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds) ICT Systems Security and Privacy Protection. SEC 2014. IFIP Advances in Information and Communication Technology, vol 428. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55415-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-55415-5_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55414-8
Online ISBN: 978-3-642-55415-5
eBook Packages: Computer ScienceComputer Science (R0)